<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Crazy policies needed for BGP and VPN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/crazy-policies-needed-for-bgp-and-vpn/m-p/75889#M42096</link>
    <description>&lt;P&gt;If you have modified your intrazone rule and made the action as deny so it means you have to create rule explicitly to allow intrazone traffic.&lt;/P&gt;</description>
    <pubDate>Wed, 06 Apr 2016 12:02:25 GMT</pubDate>
    <dc:creator>pankaku</dc:creator>
    <dc:date>2016-04-06T12:02:25Z</dc:date>
    <item>
      <title>Crazy policies needed for BGP and VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/crazy-policies-needed-for-bgp-and-vpn/m-p/75887#M42095</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;first read this article:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Learning-Articles/Any-Any-Deny-Security-Rule-Changes-Default-Behavior/ta-p/54248" target="_blank"&gt;&lt;FONT color="#00689a"&gt;https://live.paloaltonetworks.com/t5/Learning-Arti​cles/Any-Any-Deny-Security-Rule-Changes-Default-Be​...&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;then&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I have this exactly behavor but I don't have wrote any/any/deny rules!&lt;/P&gt;
&lt;P&gt;In my enviroment both&amp;nbsp;intrazone-default and interzone-default are blocked.&lt;/P&gt;
&lt;P&gt;It's that the problem ? Bho?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To build a VPN with BGP proto inside, all traffic ipsec, and bgp is blocked by intrazone-default.&lt;/P&gt;
&lt;P&gt;This policy resolve the problem:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"From PA&amp;nbsp;to AWS&amp;nbsp;tunnel VPN" {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; from UNTRUST;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source 89.186.32.5;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-region none;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to UNTRUST;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination [ 52.18.104.192 52.50.11.225 ];&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-region none;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; user any;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; category any;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; application/service [ ike/tcp/any/500 ike/udp/any/500 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipsec-esp/50/any/any ipsec-esp-udp/udp/any/4500 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipsec-esp-udp/udp/any/4501 ipsec-ah/51/any/any ];&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; action allow;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp-unreachable: no&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; terminal yes;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"From PA&amp;nbsp;to AWS BGP in tunnel VPN" {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; from VPN;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source [ 169.254.20.78 169.254.21.22 ];&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-region none;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to VPN;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination [ 169.254.20.77 169.254.21.21 ];&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-region none;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; user any;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; category any;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; application/service [ bgp/tcp/any/179 bgp/udp/any/179 ];&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; action allow;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp-unreachable: no&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; terminal yes;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 10:03:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/crazy-policies-needed-for-bgp-and-vpn/m-p/75887#M42095</guid>
      <dc:creator>Passepartout</dc:creator>
      <dc:date>2016-04-06T10:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: Crazy policies needed for BGP and VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/crazy-policies-needed-for-bgp-and-vpn/m-p/75889#M42096</link>
      <description>&lt;P&gt;If you have modified your intrazone rule and made the action as deny so it means you have to create rule explicitly to allow intrazone traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 12:02:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/crazy-policies-needed-for-bgp-and-vpn/m-p/75889#M42096</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-04-06T12:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: Crazy policies needed for BGP and VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/crazy-policies-needed-for-bgp-and-vpn/m-p/75893#M42098</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="crazy-policy.JPG" style="width: 600px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/3417i364C8B6B39B5A584/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="crazy-policy.JPG" alt="crazy-policy.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Dear Pankai,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;as you can see from this images, the traffic begin from same physical interface where is the destination....&lt;BR /&gt;what kind of intrazone traffic is that?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 12:14:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/crazy-policies-needed-for-bgp-and-vpn/m-p/75893#M42098</guid>
      <dc:creator>Passepartout</dc:creator>
      <dc:date>2016-04-06T12:14:43Z</dc:date>
    </item>
    <item>
      <title>Re: Crazy policies needed for BGP and VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/crazy-policies-needed-for-bgp-and-vpn/m-p/75895#M42099</link>
      <description>&lt;P&gt;IKE traffic UDP port 500 used for negotiating IPSec tunnels.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 13:19:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/crazy-policies-needed-for-bgp-and-vpn/m-p/75895#M42099</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-04-06T13:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: Crazy policies needed for BGP and VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/crazy-policies-needed-for-bgp-and-vpn/m-p/75899#M42100</link>
      <description>&lt;P&gt;Intra-zone means "traffic within the same zone". &amp;nbsp;Inter-zone means "traffic between different zones". &amp;nbsp;The default policies for the intrA and intER-zone policies are the last two rules in your security policy:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 600px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/3418i107297FD9ABD80BC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Old(er) versions of PAN-OS do not show these intra/er-zone rules, but they still exist. &amp;nbsp;More recent versions show them. &amp;nbsp;The default is to permit traffic within the same zone (intrazone), and deny traffic between different zones (interzone). &amp;nbsp;You can override the default action either by editing these rules, or by creating an overriding rule above these default rules. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 14:59:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/crazy-policies-needed-for-bgp-and-vpn/m-p/75899#M42100</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2016-04-06T14:59:17Z</dc:date>
    </item>
  </channel>
</rss>

