<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Creating a block timeout for mac addresses for malicious behavior in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-block-timeout-for-mac-addresses-for-malicious/m-p/157055#M51555</link>
    <description>&lt;P&gt;This topic was started in the Community Feedback area, and is related to the Palo Alto Networks devices. Because of that I am moving this to the General topics area.&lt;/P&gt;</description>
    <pubDate>Wed, 17 May 2017 20:22:15 GMT</pubDate>
    <dc:creator>jdelio</dc:creator>
    <dc:date>2017-05-17T20:22:15Z</dc:date>
    <item>
      <title>Creating a block timeout for mac addresses for malicious behavior</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-block-timeout-for-mac-addresses-for-malicious/m-p/157054#M51554</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was interested if there was a way to block a mac address of a device for malicious behavior? Bacially if i have a user on a guest connection and they are searching things they shouldnt, they could be blocked for 5 minutes or whatever and then return to the network. I know its a strange request but I was curious to see if it could be done.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 20:19:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-block-timeout-for-mac-addresses-for-malicious/m-p/157054#M51554</guid>
      <dc:creator>mmaynard</dc:creator>
      <dc:date>2017-05-17T20:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a block timeout for mac addresses for malicious behavior</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-block-timeout-for-mac-addresses-for-malicious/m-p/157055#M51555</link>
      <description>&lt;P&gt;This topic was started in the Community Feedback area, and is related to the Palo Alto Networks devices. Because of that I am moving this to the General topics area.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 20:22:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-block-timeout-for-mac-addresses-for-malicious/m-p/157055#M51555</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2017-05-17T20:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a block timeout for mac addresses for malicious behavior</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-block-timeout-for-mac-addresses-for-malicious/m-p/157056#M51556</link>
      <description>&lt;P&gt;MAC address blocking is not a good way to control users as it is easy to spoof. For the guest control, you could implement&lt;SPAN&gt; a separate VLAN,&amp;nbsp;&lt;/SPAN&gt;basic security policy (allowing a minimum&amp;nbsp;for internet browsing), &amp;nbsp;as well as implement a URL filtering with other security profiles.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 20:40:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-block-timeout-for-mac-addresses-for-malicious/m-p/157056#M51556</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-17T20:40:48Z</dc:date>
    </item>
  </channel>
</rss>

