<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking All Internet Traffic from certain PCs in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/157057#M51557</link>
    <description>&lt;P&gt;Excellent. Thanks.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 May 2017 20:47:50 GMT</pubDate>
    <dc:creator>jharlow</dc:creator>
    <dc:date>2017-05-17T20:47:50Z</dc:date>
    <item>
      <title>Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156643#M51436</link>
      <description>&lt;P&gt;I have several older machines (XP) that are used for special purposes that cannot be be upgraded. Even the hardware cannot be upgraded or replaced (running on old dell dimenion desktops).&amp;nbsp; These machines do not need access to the internet but they are on the same domain and need to be able to communicate with other domain machines.&amp;nbsp; I want to make it where these machines cannot access any internet resources to reduce the change of malware/virus type activities.&amp;nbsp; I was thinking that I can setup a rule/URL filter, that would block access and add these machines IP addresses to the list.&amp;nbsp; Is this the best way to achieve this goal?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 13:41:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156643#M51436</guid>
      <dc:creator>jharlow</dc:creator>
      <dc:date>2017-05-15T13:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156680#M51447</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/17447"&gt;@jharlow&lt;/a&gt;&amp;nbsp;The only native was to do it is via IP (Static or FQDN entry). &amp;nbsp;Or if you've got a list that can be dynamically updated I've explained here how I've deployed a list of dynamically updating machines.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/General-Topics/Can-I-enforce-security-based-in-AD-Computer-groups-yet/m-p/146416#M49187&amp;nbsp;" target="_blank"&gt;https://live.paloaltonetworks.com/t5/General-Topics/Can-I-enforce-security-based-in-AD-Computer-groups-yet/m-p/146416#M49187&amp;nbsp;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 17:03:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156680#M51447</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2017-05-15T17:03:31Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156721#M51461</link>
      <description>&lt;P&gt;I am not sure if I follow you?&amp;nbsp; I have AD connected and use it to filter users for other policies.&amp;nbsp; If you were agreeing with me that a separate policy is the best way to block internet access and add the XP machine via their static IP, then we are on the same page.&amp;nbsp; Guess I wanted to check to see if there was a better way?&amp;nbsp; The URL filtering will allow me to filter by category. Right now I have a policy created that I set BLOCK on all types but not sure if that is best way on going about this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 19:10:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156721#M51461</guid>
      <dc:creator>jharlow</dc:creator>
      <dc:date>2017-05-15T19:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156784#M51474</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Even a DHCP address with a reservation would be OK, as long as these IP's dont change. You wouldnt have to have a new URL policy, just one that blocks traffic from trust -&amp;gt; untrust. While you could get tricky with the config, I would say simple works best.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 22:51:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156784#M51474</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-05-15T22:51:56Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156797#M51481</link>
      <description>&lt;P&gt;Sorry...Your original question/statement didn't define all the potential variables so I was answering all of them...Albeit&amp;nbsp;not very clearly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have a set of XP machines which you don't want them to access the Internet. &amp;nbsp;(These will have to have their own unique security rule unless you've got one already built which blocks&amp;nbsp;access to the Internet) &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was answering based upon them potentially being a dynamic IP / IP range.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;'s suggestion is how I'd go. &amp;nbsp;If you were simpling from from "internal" to "Internet" then I wouldn't even bother with a URL filtering policy. &amp;nbsp;A simple L3 security policy with a "deny" action would be the easiest way to go.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 00:58:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156797#M51481</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2017-05-16T00:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156896#M51503</link>
      <description>&lt;P&gt;Gotcha!&amp;nbsp; I dont know if I can use that method as of yet. Our PA is in transparent mode, as the only policies we have in place is for URL filtering and AV/Malware scanning. We have an older Cisco ASA that handles NAT.&amp;nbsp; The goal is to transition over to the PA, but getting there from where we are now ...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any case, your response helps me understand what I can do.&amp;nbsp; Thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 13:03:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156896#M51503</guid>
      <dc:creator>jharlow</dc:creator>
      <dc:date>2017-05-16T13:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156902#M51504</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Even in vwire mode you are still able to accomplish this. Each side of the vwire should have its own zone, i.e. trust&amp;nbsp;and untrust (these are just names, can be anmed anything as long as it makes sense to you). Lets say the PC's you want to block internet from are on the trust side. Just create 2 policies such as:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9281iC752C35A55011CD3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Untitled.jpg" alt="Untitled.jpg" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just like the ASA the PAN reads rules top down left to right. So as long as the rule matches the appropriate action is taken.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 13:18:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156902#M51504</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-05-16T13:18:15Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156915#M51510</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;Can we be friends? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Wow! That was easy enough and does exactly what I needed! Thanks!&amp;nbsp; Curious, is that basically what I need to do to make this a layer 3 device versus vwire, minus NAT rules?&amp;nbsp; Or a different way to ask, is all that is needed is to create the same NAT rules from the ASA on the PA and this is a L3 device or is there more to that?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 15:18:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156915#M51510</guid>
      <dc:creator>jharlow</dc:creator>
      <dc:date>2017-05-16T15:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156918#M51512</link>
      <description>&lt;P&gt;Just glad I could help. I know how new technologies and devices can be a bit frustrating at times. I also came from an ASA world and can say that I wont go back :).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for converting from vwire to a L3 device, yes there is more that needs to be accomplished. The way I have done it in the past is by having the two devices in parallel and manually entering the settings, NAT's and policies, from the ASA to the PAN. I do it this way so I can weed out the NAT's/Policies that are no longer needed. Also this helps me learn the new platform, in this case the PAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is a migration tool available that many on this forum have used successfully (I have not). I would say the decision is yours based on not only NAT's/Policies but also objects and other configs you want to migrate over. I would say start a new post if you are looking for assistance with the Migration tool and someone who has used it will help you out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Migration tool:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Migration-Tool-Articles/Download-the-Migration-Tool/ta-p/56582" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Migration-Tool-Articles/Download-the-Migration-Tool/ta-p/56582&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;User guide:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Migration-Tool-Articles/Migration-Tool-3-Info-and-Guide/ta-p/55294" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Migration-Tool-Articles/Migration-Tool-3-Info-and-Guide/ta-p/55294&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best practices:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Migration-Tool-Articles/Migration-Tool-Best-Practices/ta-p/56651" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Migration-Tool-Articles/Migration-Tool-Best-Practices/ta-p/56651&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BTW welcome to the PAN world :).&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 15:27:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156918#M51512</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-05-16T15:27:52Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156923#M51513</link>
      <description>&lt;P&gt;Yeah, I would do it manually as well. The issue I have and I am assuming this; is making the change from vwire to L3 would require resetting the device (lossing all of my custom settings I have now; aka URL filtering rules.) Is that correct?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 15:57:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156923#M51513</guid>
      <dc:creator>jharlow</dc:creator>
      <dc:date>2017-05-16T15:57:22Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156925#M51515</link>
      <description>&lt;P&gt;Nope, you wont have to. all that stays...The changes come in with the Zones, Virtual Routers, Interface configurations etc. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 16:05:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156925#M51515</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-05-16T16:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156972#M51529</link>
      <description>&lt;P&gt;Any chance, this process is documented somewhere ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 21:31:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/156972#M51529</guid>
      <dc:creator>jharlow</dc:creator>
      <dc:date>2017-05-16T21:31:22Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/157038#M51550</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Oviously these are just guides and each environment is different so caution is recommended.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/General-Topics/Convert-from-vwire-to-layer-3-for-globalprotect/m-p/24352/highlight/true#M17751" target="_blank"&gt;https://live.paloaltonetworks.com/t5/General-Topics/Convert-from-vwire-to-layer-3-for-globalprotect/m-p/24352/highlight/true#M17751&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Layer-3-NAT-and-DHCP/ta-p/66999" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Layer-3-NAT-and-DHCP/ta-p/66999&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is not just one answer for this however.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 15:28:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/157038#M51550</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-05-17T15:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking All Internet Traffic from certain PCs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/157057#M51557</link>
      <description>&lt;P&gt;Excellent. Thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 20:47:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-all-internet-traffic-from-certain-pcs/m-p/157057#M51557</guid>
      <dc:creator>jharlow</dc:creator>
      <dc:date>2017-05-17T20:47:50Z</dc:date>
    </item>
  </channel>
</rss>

