<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy for AD authentication across zones in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/policy-for-ad-authentication-across-zones/m-p/79128#M43162</link>
    <description>&lt;P&gt;This documentation on MS TechNet details the AD port requirements and their function.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://technet.microsoft.com/en-us/library/dd772723(v=ws.10).aspx" target="_blank"&gt;https://technet.microsoft.com/en-us/library/dd772723(v=ws.10).aspx&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 05 Jun 2016 12:01:12 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2016-06-05T12:01:12Z</dc:date>
    <item>
      <title>Policy for AD authentication across zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-for-ad-authentication-across-zones/m-p/78855#M43053</link>
      <description>&lt;P&gt;Trying to narrow it down and determine the minimum set of applications/services that need to be allowed for a user to login into a Windows 7 client in one zone and authenticate against a Server 2008R2 AD Domain Controller in a different zone? The Windows 7 client is a member of the domain. Need the ability for users to change passwords, access a read-only file share and also for GPO to work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas are very much appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2016 22:30:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-for-ad-authentication-across-zones/m-p/78855#M43053</guid>
      <dc:creator>PierreJvR</dc:creator>
      <dc:date>2016-05-31T22:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: Policy for AD authentication across zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-for-ad-authentication-across-zones/m-p/79128#M43162</link>
      <description>&lt;P&gt;This documentation on MS TechNet details the AD port requirements and their function.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://technet.microsoft.com/en-us/library/dd772723(v=ws.10).aspx" target="_blank"&gt;https://technet.microsoft.com/en-us/library/dd772723(v=ws.10).aspx&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Jun 2016 12:01:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-for-ad-authentication-across-zones/m-p/79128#M43162</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2016-06-05T12:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: Policy for AD authentication across zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-for-ad-authentication-across-zones/m-p/79950#M43265</link>
      <description>&lt;P&gt;Thanks Steve,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is a useful TechNet article, but it is about DC to DC communications; I'm looking for client to DC communications info.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Pierre&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2016 14:42:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-for-ad-authentication-across-zones/m-p/79950#M43265</guid>
      <dc:creator>PierreJvR</dc:creator>
      <dc:date>2016-06-08T14:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: Policy for AD authentication across zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-for-ad-authentication-across-zones/m-p/83731#M43324</link>
      <description>&lt;P&gt;Can't seem to find the client to DC article. &amp;nbsp;But here are the ports I pulled when setting this up a few years back.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;53/tcp and 53/udp (only if the DC is also the&amp;nbsp;DNS source)&lt;BR /&gt;749/udp&lt;BR /&gt;88/tcp/udp&lt;BR /&gt;389/tcp/udp&lt;BR /&gt;3268/tcp&amp;nbsp;&lt;/P&gt;
&lt;P&gt;445/tcp/udp&lt;BR /&gt;123/udp&lt;BR /&gt;135/tcp&lt;/P&gt;
&lt;P&gt;tcp random range:&amp;nbsp;49152 to&amp;nbsp;65535&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2016 23:51:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-for-ad-authentication-across-zones/m-p/83731#M43324</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2016-06-10T23:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: Policy for AD authentication across zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-for-ad-authentication-across-zones/m-p/86967#M43429</link>
      <description>&lt;P&gt;Hello and sorry for the late reply. Here are the applications I have setup for my cross zone AD authentication:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;active-directoy&lt;/P&gt;
&lt;P&gt;dns&lt;/P&gt;
&lt;P&gt;kerberos&lt;/P&gt;
&lt;P&gt;ldap&lt;/P&gt;
&lt;P&gt;ms-ds-smb&lt;/P&gt;
&lt;P&gt;ms-kms&lt;/P&gt;
&lt;P&gt;ms-netlogon&lt;/P&gt;
&lt;P&gt;ms-product-activation&lt;/P&gt;
&lt;P&gt;msrpc&lt;/P&gt;
&lt;P&gt;netbios-dg&lt;/P&gt;
&lt;P&gt;netbios-ns&lt;/P&gt;
&lt;P&gt;netbios-ss&lt;/P&gt;
&lt;P&gt;ntp&lt;/P&gt;
&lt;P&gt;ssl&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm sure you might not need all, but its a start.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2016 14:07:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-for-ad-authentication-across-zones/m-p/86967#M43429</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2016-06-15T14:07:12Z</dc:date>
    </item>
  </channel>
</rss>

