<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Panorama location best practice in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-location-best-practice/m-p/141110#M48335</link>
    <description>&lt;P&gt;A quick&amp;nbsp;follow up. I decided to leave it in the LAN despite the little downsides. I realized that it could potentially store sensetive data that should not be exposed in a DMZ kind of a network segement. Also, it would make integration with internal DNS, User-ID agents, etc. easier.&lt;/P&gt;&lt;P&gt;Just in case this helps someone...&lt;/P&gt;</description>
    <pubDate>Sat, 04 Feb 2017 09:44:38 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2017-02-04T09:44:38Z</dc:date>
    <item>
      <title>Panorama location best practice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-location-best-practice/m-p/139730#M48170</link>
      <description>&lt;P&gt;I have deployed Panorama in our LAN and plan to manage a global install. Now I realized that remote firewalls cannot reach it until they have their VPN setup (which I prefer to do using Panorama too).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best practice to solve this? Should Panorama reside in a DMZ and have managed firewalls communicate over the Internet to a public IP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 10:58:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-location-best-practice/m-p/139730#M48170</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2017-01-27T10:58:04Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama location best practice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-location-best-practice/m-p/139892#M48192</link>
      <description>&lt;P&gt;I've not seen a recomendation in the PA documents but I have done this type of management using both methods. &amp;nbsp;Personally I prefer the public address connect method. &amp;nbsp;I like to setup and manage the VPN as you mention but also if there are issues with the VPN then mgmt is still available as long as the internet link itself is up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You identify the advantages and disadvantages for the main features. &amp;nbsp;If you decide to go with the public address management be sure to setup specific rules that only permit access to the branch devices from the Panorama NAT address. &amp;nbsp;Make sure the surface area opened is the minimum needed.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Jan 2017 19:23:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-location-best-practice/m-p/139892#M48192</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-01-28T19:23:24Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama location best practice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-location-best-practice/m-p/139897#M48193</link>
      <description>&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 28 Jan 2017 21:34:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-location-best-practice/m-p/139897#M48193</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2017-01-28T21:34:45Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama location best practice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-location-best-practice/m-p/141110#M48335</link>
      <description>&lt;P&gt;A quick&amp;nbsp;follow up. I decided to leave it in the LAN despite the little downsides. I realized that it could potentially store sensetive data that should not be exposed in a DMZ kind of a network segement. Also, it would make integration with internal DNS, User-ID agents, etc. easier.&lt;/P&gt;&lt;P&gt;Just in case this helps someone...&lt;/P&gt;</description>
      <pubDate>Sat, 04 Feb 2017 09:44:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-location-best-practice/m-p/141110#M48335</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2017-02-04T09:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama location best practice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/panorama-location-best-practice/m-p/141117#M48340</link>
      <description>&lt;P&gt;All good reasons for the internal side connections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have a good handle on the benefits each way. &amp;nbsp;I'm sure your deployment will go well.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Feb 2017 12:07:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/panorama-location-best-practice/m-p/141117#M48340</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-02-04T12:07:15Z</dc:date>
    </item>
  </channel>
</rss>

