<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is policy order inspection on Palo alto? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5539#M4045</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So from the Packet life document we can summarize this as&lt;/P&gt;&lt;P&gt;1)PBF&lt;/P&gt;&lt;P&gt;2)Regular Routing table&lt;/P&gt;&lt;P&gt;3)Nat policy evaluation to determine egress zone ( not actual nat is happening in this stage)&lt;/P&gt;&lt;P&gt;4)Security policy&amp;nbsp; (captive portal depends on the security policy)&lt;/P&gt;&lt;P&gt;5)Nat translation (conversion of the addresses)&lt;/P&gt;&lt;P&gt;6)Ssl decryption&lt;/P&gt;&lt;P&gt;7)App override&lt;/P&gt;&lt;P&gt;8)Second security policy match to block traffic beasd on applications.&lt;/P&gt;&lt;P&gt;9)Qos on the egress interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security look up is done twice one before app identification and another app identification. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 20 Sep 2012 06:06:02 GMT</pubDate>
    <dc:creator>sdurga</dc:creator>
    <dc:date>2012-09-20T06:06:02Z</dc:date>
    <item>
      <title>What is policy order inspection on Palo alto?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5535#M4041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in policy tab there are a few policy like security, NAT, Qos, PBF, Decryption, Application override, captive portal and DOS protection. my question is what is policy order inspection on Palo alto.which policy palo alto will look first?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Indra&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2012 15:14:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5535#M4041</guid>
      <dc:creator>el</dc:creator>
      <dc:date>2012-09-19T15:14:12Z</dc:date>
    </item>
    <item>
      <title>Re: What is policy order inspection on Palo alto?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5536#M4042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;my guess :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 - PBF because PBF can change destination Zone/internface &lt;/P&gt;&lt;P&gt;2 - NAT for same reasons&lt;/P&gt;&lt;P&gt;3 - App override because Security policy can rely on it&lt;/P&gt;&lt;P&gt;4 - CP&lt;/P&gt;&lt;P&gt;5 - Security (finally &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;6 - Decryption&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that some layers are so connected, I wouldn't be surprised to know that they depend on each other.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2012 15:19:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5536#M4042</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2012-09-19T15:19:57Z</dc:date>
    </item>
    <item>
      <title>Re: What is policy order inspection on Palo alto?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5537#M4043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1 PBF&lt;/P&gt;&lt;P&gt;2 NAT Precheck (if we have to NAT later)&lt;/P&gt;&lt;P&gt;3 Decryption&lt;/P&gt;&lt;P&gt;4 App Override&lt;/P&gt;&lt;P&gt;5 CP (not 100% sure that CP is at this stage)&lt;/P&gt;&lt;P&gt;6 Security&lt;/P&gt;&lt;P&gt;7 NAT applied&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;Marco&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2012 16:13:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5537#M4043</guid>
      <dc:creator>ExclusiveNetworksGermany</dc:creator>
      <dc:date>2012-09-19T16:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: What is policy order inspection on Palo alto?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5538#M4044</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1628"&gt;https://live.paloaltonetworks.com/docs/DOC-1628&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2012 16:24:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5538#M4044</guid>
      <dc:creator>sdurga</dc:creator>
      <dc:date>2012-09-19T16:24:16Z</dc:date>
    </item>
    <item>
      <title>Re: What is policy order inspection on Palo alto?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5539#M4045</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So from the Packet life document we can summarize this as&lt;/P&gt;&lt;P&gt;1)PBF&lt;/P&gt;&lt;P&gt;2)Regular Routing table&lt;/P&gt;&lt;P&gt;3)Nat policy evaluation to determine egress zone ( not actual nat is happening in this stage)&lt;/P&gt;&lt;P&gt;4)Security policy&amp;nbsp; (captive portal depends on the security policy)&lt;/P&gt;&lt;P&gt;5)Nat translation (conversion of the addresses)&lt;/P&gt;&lt;P&gt;6)Ssl decryption&lt;/P&gt;&lt;P&gt;7)App override&lt;/P&gt;&lt;P&gt;8)Second security policy match to block traffic beasd on applications.&lt;/P&gt;&lt;P&gt;9)Qos on the egress interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security look up is done twice one before app identification and another app identification. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 06:06:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5539#M4045</guid>
      <dc:creator>sdurga</dc:creator>
      <dc:date>2012-09-20T06:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: What is policy order inspection on Palo alto?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5540#M4046</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI All&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;why app override order after security policy? if i'm not wrong, with app override will bypass app id engine. if security come first mean will check till app layer please correct me if im wrong then where is DOS proection when fw will inspect? btw for every policy available we always must to create security policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ex. i want to create DOS protection policy so mean need to create on DOS policy and also on security policy, etc. if got any document that can make me easily to understand it would be good, for packet flow documentation its not really clear for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Indra Elkim &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 12:46:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5540#M4046</guid>
      <dc:creator>el</dc:creator>
      <dc:date>2012-09-20T12:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: What is policy order inspection on Palo alto?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5541#M4047</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Indra,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As mentioned before the security policy are processed 2 times, one before the application inspection and one after the application inspection. So after we process the security rule for the first time it goes and check the application over-ride rule &lt;/P&gt;&lt;P&gt;Same should be the case of DOS protection policies.&lt;/P&gt;&lt;P&gt;For example, if you want to create an application over-ride rule from source zone :-Trust to Destination zone:-Untrust , you still have to create a security policy for the traffic and sessions from Trust to untrust zone. DOS rules also works the same way.&lt;/P&gt;&lt;P&gt;Just make sure, Security policy is used to govern traffic within the security zones except the fact that PBF,regular routing table takes precedence .&lt;/P&gt;&lt;P&gt;Let me know if that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 23:09:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-policy-order-inspection-on-palo-alto/m-p/5541#M4047</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-20T23:09:37Z</dc:date>
    </item>
  </channel>
</rss>

