<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Usage of Security Policy in Palo Alto Firewall in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/usage-of-security-policy-in-palo-alto-firewall/m-p/144899#M48955</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56680"&gt;@bradk14&lt;/a&gt;&amp;nbsp;I concur!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Benjamin&lt;/P&gt;</description>
    <pubDate>Sat, 25 Feb 2017 16:17:16 GMT</pubDate>
    <dc:creator>BenjAudy.MTL</dc:creator>
    <dc:date>2017-02-25T16:17:16Z</dc:date>
    <item>
      <title>Usage of Security Policy in Palo Alto Firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/usage-of-security-policy-in-palo-alto-firewall/m-p/144861#M48947</link>
      <description>&lt;P&gt;hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am bit confuse of the usage of rule no 2 and 3. Eventually they will deny the traffic. But which two benefits are gained from having both rule 2 and rule 3 presents? Any clarification please.&lt;BR /&gt;&lt;BR /&gt;A.&amp;nbsp;&amp;nbsp; &amp;nbsp;A report can be created that identifies unclassified traffic on the network.&lt;BR /&gt;B.&amp;nbsp;&amp;nbsp; &amp;nbsp;Different security profiles can be applied to traffic matching rules 2 and 3.&lt;BR /&gt;C.&amp;nbsp;&amp;nbsp; &amp;nbsp;Rule 2 and 3 apply to traffic on different ports.&lt;BR /&gt;D.&amp;nbsp;&amp;nbsp; &amp;nbsp;Separate Log Forwarding profiles can be applied to rules 2 and 3.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PA1.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7904iCB9757ADE3458ED5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PA1.JPG" alt="PA1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Feb 2017 00:23:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/usage-of-security-policy-in-palo-alto-firewall/m-p/144861#M48947</guid>
      <dc:creator>harshaabba</dc:creator>
      <dc:date>2017-02-25T00:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Usage of Security Policy in Palo Alto Firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/usage-of-security-policy-in-palo-alto-firewall/m-p/144894#M48951</link>
      <description>&lt;P&gt;I'll go out on a limb and attempt an answer and hopefully someone will correct me if I'm wrong, so take this with a grain of salt:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;A.&amp;nbsp;&amp;nbsp; &amp;nbsp;A report can be created that identifies unclassified traffic on the network.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Based on the rules, an app is going to fall under either: Known Good, Known Bad or 'any' which would fall under being unclassified. For example, if Twitter is in neither of those two object groups, then it is unclassified and you can run a report showing that it was attempted to be accessed based on rule #3 being hit (or more simply, just apply a filter in the traffic log).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;B.&amp;nbsp;&amp;nbsp; &amp;nbsp;Different security profiles can be applied to traffic matching rules 2 and 3.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;While this is technically true, security profiles are only processed if the policy action is allow, so they will have no effect here. (i.e., it would be a waste of resources to run threat prevention against a session that won't be allowed anyway).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;C.&amp;nbsp;&amp;nbsp; &amp;nbsp;Rule 2 and 3 apply to traffic on different ports.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;As both apply to all ('any') ports, this would not make sense.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;D.&amp;nbsp;&amp;nbsp; &amp;nbsp;Separate Log Forwarding profiles can be applied to rules 2 and 3.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;As with B, this is true as well. Only in this case, it &lt;EM&gt;will&lt;/EM&gt; be applied, so you can choose where the results of either policy will be forwarded to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Therefore my answer would be A &amp;amp; D.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Feb 2017 12:28:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/usage-of-security-policy-in-palo-alto-firewall/m-p/144894#M48951</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-02-25T12:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: Usage of Security Policy in Palo Alto Firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/usage-of-security-policy-in-palo-alto-firewall/m-p/144899#M48955</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56680"&gt;@bradk14&lt;/a&gt;&amp;nbsp;I concur!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Benjamin&lt;/P&gt;</description>
      <pubDate>Sat, 25 Feb 2017 16:17:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/usage-of-security-policy-in-palo-alto-firewall/m-p/144899#M48955</guid>
      <dc:creator>BenjAudy.MTL</dc:creator>
      <dc:date>2017-02-25T16:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: Usage of Security Policy in Palo Alto Firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/usage-of-security-policy-in-palo-alto-firewall/m-p/144912#M48961</link>
      <description>&lt;P&gt;Thanks a lot mate for the great explanation&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56680"&gt;@bradk14&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;I'll go out on a limb and attempt an answer and hopefully someone will correct me if I'm wrong, so take this with a grain of salt:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;A.&amp;nbsp;&amp;nbsp; &amp;nbsp;A report can be created that identifies unclassified traffic on the network.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Based on the rules, an app is going to fall under either: Known Good, Known Bad or 'any' which would fall under being unclassified. For example, if Twitter is in neither of those two object groups, then it is unclassified and you can run a report showing that it was attempted to be accessed based on rule #3 being hit (or more simply, just apply a filter in the traffic log).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;B.&amp;nbsp;&amp;nbsp; &amp;nbsp;Different security profiles can be applied to traffic matching rules 2 and 3.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;While this is technically true, security profiles are only processed if the policy action is allow, so they will have no effect here. (i.e., it would be a waste of resources to run threat prevention against a session that won't be allowed anyway).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;C.&amp;nbsp;&amp;nbsp; &amp;nbsp;Rule 2 and 3 apply to traffic on different ports.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;As both apply to all ('any') ports, this would not make sense.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;D.&amp;nbsp;&amp;nbsp; &amp;nbsp;Separate Log Forwarding profiles can be applied to rules 2 and 3.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;As with B, this is true as well. Only in this case, it &lt;EM&gt;will&lt;/EM&gt; be applied, so you can choose where the results of either policy will be forwarded to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Therefore my answer would be A &amp;amp; D.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot mate for the great explanation.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Feb 2017 02:11:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/usage-of-security-policy-in-palo-alto-firewall/m-p/144912#M48961</guid>
      <dc:creator>harshaabba</dc:creator>
      <dc:date>2017-02-26T02:11:26Z</dc:date>
    </item>
    <item>
      <title>Re: Usage of Security Policy in Palo Alto Firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/usage-of-security-policy-in-palo-alto-firewall/m-p/144930#M48963</link>
      <description>&lt;P&gt;The setup you see here, is used for port to App-ID migration. Customer migrating from other firewalls, port based, to Palo Alto Networks, will typically be done with no policy changes as the first step. Then App-ID adoption is the next step.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other customers start from scratch, building an App-ID based ruleset from day 1. Then the 3 policy lines you see will be used. The last rule you could call a "clean up rule". Everything that are to match that rule, are for you to move into one of the two above. Me personally would have moved the known bad to the top. When you've cleaned up things, after verifying for days or weeks, depends on you gut feeling, and when you see close to nothing in the last rule, you could just disable/delete the any rule. Then you've created a Application based White List ruleset. And that's what Palo Alto Networks is all about, bringing back the default action of the firewall, by doing what the intention of the firewall has always been, to control what you allow.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Feb 2017 14:15:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/usage-of-security-policy-in-palo-alto-firewall/m-p/144930#M48963</guid>
      <dc:creator>gtomte</dc:creator>
      <dc:date>2017-02-26T14:15:16Z</dc:date>
    </item>
  </channel>
</rss>

