<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best practice with defining Zones - how many is too many in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156397#M51336</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm not sure I did a good job of explaining what I meant in my earlier post. You can have multiple subnets within the same zone and have policies defining what traffic can pass.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i.e.&amp;nbsp;&lt;/P&gt;&lt;P&gt;zone 1 = 10.0.0.1/24&lt;/P&gt;&lt;P&gt;zone 1 = 172.16.0.1/24&lt;/P&gt;&lt;P&gt;zone 1 = 192.168.0.1/24&lt;/P&gt;&lt;P&gt;Policies&lt;/P&gt;&lt;P&gt;zone 1 source subnet 10.0.0.1/24 can send smtp to zone 1 172.16.0.1/24 and deny all other traffic. This way the 10.0.0.1/24 zone can send smtp packets to 172.16.0.1/24 but deny packets from 192.168.0.1/24 (if these were the only policies, etc.).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While this is a highly simplified example, remember that each column in the security policies has to match. This way you can split up your zones using subnets so you dont run out :).&lt;/P&gt;</description>
    <pubDate>Fri, 12 May 2017 13:44:18 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2017-05-12T13:44:18Z</dc:date>
    <item>
      <title>Best practice with defining Zones - how many is too many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156105#M51253</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I have 3 locations (DC), Internet access , Vendor access, environment (Prod, Uat etc) and user and support users and dmz and ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;should each of these be a zone ??? &amp;nbsp;I am thinking not, after have a bit of a play, you can't make dynamic zones from tags.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I am thinking&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;zone_internet - where the interface talks to the internet&lt;/P&gt;&lt;P&gt;zone_vendor - where there interface talk to my Vendor network&amp;nbsp;&lt;/P&gt;&lt;P&gt;zone_int - anything inside.&lt;/P&gt;&lt;P&gt;zone - guest - i have a guest wifi network &amp;nbsp;- sort of internet ....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;maybe ...&lt;/P&gt;&lt;P&gt;a zone prod - to add extra protection around prod ??? or just use address groups&lt;/P&gt;&lt;P&gt;zone - staff &amp;nbsp;&amp;lt;&amp;lt; probably most dangerious group &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;zone - support staff &amp;lt;&amp;lt; nearly as dangerious as the above&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 00:07:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156105#M51253</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-05-11T00:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice with defining Zones - how many is too many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156176#M51266</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keep in mind that if you want a flow move from on zone to another, you need a security rule.&lt;/P&gt;&lt;P&gt;Then more you have zone more you hace security policies and potentially more you have to provide support and more it's difficult to maintain.&lt;/P&gt;&lt;P&gt;If you work in a bank, for sure you need more zone than if you are a small company ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then there is no worldwide best best practice ...&lt;/P&gt;&lt;P&gt;Just see a zone as a Trust group .... group in zone computer with same trust level.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 08:08:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156176#M51266</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2017-05-11T08:08:37Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice with defining Zones - how many is too many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156178#M51268</link>
      <description>&lt;P&gt;you can be pretty flexible with the amount of zones you use as long as you take into account there are 2 default rules at the end of the security policy that allow intrazone and block interzone sessions&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so to prevent unchecked cross-talk, you'll want to create your own intrazone policies&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title=" Optimize Your Security Policy" href="https://live.paloaltonetworks.com/t5/Tutorials/Optimize-Your-Security-Policy/ta-p/78659" target="_blank"&gt; Optimize Your Security Policy&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A title=" Intrazone vs. interzone rules" href="https://live.paloaltonetworks.com/t5/Tutorials/Intrazone-vs-interzone-rules/ta-p/72202" target="_blank"&gt; Intrazone vs. interzone rules&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 08:14:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156178#M51268</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-05-11T08:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice with defining Zones - how many is too many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156264#M51298</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Another thing to consider is the limit on the number of zones you PAN can support. To aleviate this and still lock things down, you can use a combination, e.g. a large encompasing zone broken up into subnets. Then you will need policies to allow traffic such as the two prvious posts suggest.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 18:25:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156264#M51298</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-05-11T18:25:45Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice with defining Zones - how many is too many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156307#M51316</link>
      <description>&lt;P&gt;I can see a zone per vlan / network, &amp;nbsp;but thats a lot of zones.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where can I find the limitation on say a pa-3060 for the number of zones ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;plus question. &amp;nbsp;if I have 5 zones z1 , z2 ... z5 and then are connected in serial one after another&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;z1 -&amp;gt; z2 -&amp;gt; ... -&amp;gt;z5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if I have a packet that is coming from z5 going to zone 1 and I have a rule that says allow z1 to talk to z5 &amp;nbsp;will the PA allow it through even though the next hop is z2 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 00:19:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156307#M51316</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-05-12T00:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice with defining Zones - how many is too many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156309#M51318</link>
      <description>&lt;P&gt;PA3060 supports 40 zones.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A title="https://www.paloaltonetworks.com/content/pan/en_US/products/product-comparison.html?chosen=pa-3020,pa-3060" href="https://www.paloaltonetworks.com/content/pan/en_US/products/product-comparison.html?chosen=pa-3020,pa-3060" target="_blank"&gt;https://www.paloaltonetworks.com/content/pan/en_US/products/product-comparison.html?chosen=pa-3020,pa-3060&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you explain a bit your serial zone setup.&lt;/P&gt;&lt;P&gt;You need rule every time traffic moves from one zone to other.&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 00:36:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156309#M51318</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-12T00:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice with defining Zones - how many is too many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156370#M51328</link>
      <description>&lt;P&gt;I'm also wondering how you are serializing the zones &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but the underlying logic is that each time a packet is received, a route lookup determines source and destination zone. the security policy will need to match those zones for it to allow the session to be created and the packets to pass through&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you're doing vsys hopping, you'd need a policy per vsys that accomodates the packet going into and coming out of 'the void' ('external' zone) between the vsys&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;a security policy is session-state aware, so you only need to create a policy in the direction of the syn, returning ack packets will automatically match the policy&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 12:03:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156370#M51328</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-05-12T12:03:40Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice with defining Zones - how many is too many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156397#M51336</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm not sure I did a good job of explaining what I meant in my earlier post. You can have multiple subnets within the same zone and have policies defining what traffic can pass.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i.e.&amp;nbsp;&lt;/P&gt;&lt;P&gt;zone 1 = 10.0.0.1/24&lt;/P&gt;&lt;P&gt;zone 1 = 172.16.0.1/24&lt;/P&gt;&lt;P&gt;zone 1 = 192.168.0.1/24&lt;/P&gt;&lt;P&gt;Policies&lt;/P&gt;&lt;P&gt;zone 1 source subnet 10.0.0.1/24 can send smtp to zone 1 172.16.0.1/24 and deny all other traffic. This way the 10.0.0.1/24 zone can send smtp packets to 172.16.0.1/24 but deny packets from 192.168.0.1/24 (if these were the only policies, etc.).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While this is a highly simplified example, remember that each column in the security policies has to match. This way you can split up your zones using subnets so you dont run out :).&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 13:44:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156397#M51336</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-05-12T13:44:18Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice with defining Zones - how many is too many</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156403#M51337</link>
      <description>&lt;P&gt;We do a lot of what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;outlined. &amp;nbsp;Our security zones are defined by grouping network types. &amp;nbsp;For example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internet&lt;/P&gt;&lt;P&gt;DMZ&lt;/P&gt;&lt;P&gt;Wifi&lt;/P&gt;&lt;P&gt;Residence Network&lt;/P&gt;&lt;P&gt;Data Center&lt;/P&gt;&lt;P&gt;Main Network&lt;/P&gt;&lt;P&gt;Load Balancers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Each actual network has a subnet and each security zone can consist of one or many networks. &amp;nbsp;Rules that say "Allow traffic from Wifi security zone" would allow traffic from any network inside that zone whereas "Allow traffic from Wifi security zone if it is from subnet 192.168.1.0/24" would allow traffic only from a specific network/range in that zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far it has worked out really well for us although one of my supervisors asked if we could do sub-zones... something like a "Building A" zone that belongs to the Residence Network zone. &amp;nbsp;For them it is mostly about readability in the monitoring logs but I haven't seen a way to do this yet. &amp;nbsp;Instead we just kind of have to know what the subnets for each building are or reference our documentation.&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 14:11:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-with-defining-zones-how-many-is-too-many/m-p/156403#M51337</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2017-05-12T14:11:08Z</dc:date>
    </item>
  </channel>
</rss>

