<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Re: Test PA-200 parrallel to current firewall in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/test-pa-200-parrallel-to-current-firewall/m-p/5544#M4050</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;Thanks jdelio.&lt;/P&gt;&lt;P&gt;That seems what I am looking for. The admin guide is not telling much, but using tap mode deployment I could find an how to on configuring this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;BR /&gt;Menno.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 Apr 2014 13:22:42 GMT</pubDate>
    <dc:creator>admin</dc:creator>
    <dc:date>2014-04-08T13:22:42Z</dc:date>
    <item>
      <title>Test PA-200 parrallel to current firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/test-pa-200-parrallel-to-current-firewall/m-p/5542#M4048</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I received a PA-200 device for review and testing. I like to set it up besides my current firewall and see what it can filter.&lt;/P&gt;&lt;P&gt;Via SPAN Monitor on a Cisco switch I copy all traffic on the UNTRUST side to the PA-200. Now I get a lot of tcp-reject-non-syn drops.&lt;/P&gt;&lt;P&gt;What is the correct way to configure the PA-200 to listen to all traffic on the UNTRUST line?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 11:30:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/test-pa-200-parrallel-to-current-firewall/m-p/5542#M4048</guid>
      <dc:creator>MdeLoos</dc:creator>
      <dc:date>2014-04-08T11:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: Test PA-200 parrallel to current firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/test-pa-200-parrallel-to-current-firewall/m-p/5543#M4049</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Normally you mirror the port from the "external" working interface to wherever the PAN is plugged into, and configure the PAN to be in a "TAP" interface mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the PAN in "TAP" mode for its interface? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Per the Admin guide, it states the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Tap Mode Deployments&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;A network tap is a device that provides a way to access data flowing across a computer network. Tap&lt;/P&gt;&lt;P&gt;mode deployment allows you to passively monitor traffic flows across a network by way of a switch&lt;/P&gt;&lt;P&gt;SPAN or mirror port.&lt;/P&gt;&lt;P&gt;The SPAN or mirror port permits the copying of traffic from other ports on the switch. By dedicating an&lt;/P&gt;&lt;P&gt;interface on the firewall as a tap mode interface and connecting it with a switch SPAN port, the switch&lt;/P&gt;&lt;P&gt;SPAN port provides the firewall with the mirrored traffic. This provides application visibility within the&lt;/P&gt;&lt;P&gt;network without being in the flow of network traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: When deployed in tap mode, the firewall is not able to take action, such as&lt;/P&gt;&lt;P&gt;blocking traffic or applying QoS traffic control.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 13:18:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/test-pa-200-parrallel-to-current-firewall/m-p/5543#M4049</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2014-04-08T13:18:20Z</dc:date>
    </item>
    <item>
      <title>Re: Re: Test PA-200 parrallel to current firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/test-pa-200-parrallel-to-current-firewall/m-p/5544#M4050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;Thanks jdelio.&lt;/P&gt;&lt;P&gt;That seems what I am looking for. The admin guide is not telling much, but using tap mode deployment I could find an how to on configuring this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;BR /&gt;Menno.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 13:22:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/test-pa-200-parrallel-to-current-firewall/m-p/5544#M4050</guid>
      <dc:creator>admin</dc:creator>
      <dc:date>2014-04-08T13:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: Test PA-200 parrallel to current firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/test-pa-200-parrallel-to-current-firewall/m-p/5545#M4051</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please mark this as "Correct" or "Helpful" as this will help everyone in the community. &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt; Glad I could help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 13:45:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/test-pa-200-parrallel-to-current-firewall/m-p/5545#M4051</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2014-04-08T13:45:31Z</dc:date>
    </item>
  </channel>
</rss>

