<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Source zone - source address in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157565#M51665</link>
    <description>&lt;P&gt;To be exact IP spoof attack is not detected by default but only if zone protection is applied to the zone and ip spoof checkbox checked (it is best practice to have it configured).&lt;/P&gt;</description>
    <pubDate>Sun, 21 May 2017 03:07:52 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2017-05-21T03:07:52Z</dc:date>
    <item>
      <title>Source zone - source address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157194#M51575</link>
      <description>&lt;P&gt;If you enter a specific source zone but any for the source address what traffic is really allowed? Does is only allow addresses that are listed in the specified zone or is it truly any IP address?&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 14:45:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157194#M51575</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-05-18T14:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: Source zone - source address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157202#M51577</link>
      <description>&lt;P&gt;Zone =&amp;gt; Palo Interface (s) =&amp;gt; any ip that Palo sees coming into this interface&amp;nbsp;(s) is allowed.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 15:10:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157202#M51577</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-18T15:10:32Z</dc:date>
    </item>
    <item>
      <title>Re: Source zone - source address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157210#M51579</link>
      <description>&lt;P&gt;but you can limited the IP ranges inside the zone configuration can't you&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 15:49:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157210#M51579</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-05-18T15:49:38Z</dc:date>
    </item>
    <item>
      <title>Re: Source zone - source address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157211#M51580</link>
      <description>&lt;P&gt;Sure you can limit address based on single ip address, address groups or subnets etc.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 15:57:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157211#M51580</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-18T15:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: Source zone - source address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157240#M51587</link>
      <description>&lt;P&gt;So it would be any of the IP addresses assigned in the specific Zone, not just any of all IP's&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 18:05:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157240#M51587</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-05-18T18:05:48Z</dc:date>
    </item>
    <item>
      <title>Re: Source zone - source address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157241#M51588</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;A good rule of thumb is to never use ANY as a source address unless you actually need to. For example your Trust zone rules should at the very least be limited to IP addresses that you actually assign from that zone.&lt;/P&gt;&lt;P&gt;Also to be clear, if you use ANY then it allows exactly that, you don't need to assign the IP to that zone for it to be allowed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 18:18:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157241#M51588</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-05-18T18:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: Source zone - source address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157262#M51590</link>
      <description>&lt;P&gt;as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;has mentioned already any means from anywhere, even from the&amp;nbsp;different&amp;nbsp;subnet. A good example is DNAT. You allow any ip&amp;nbsp;from the lnternet to access your internal server. So in your policy, &amp;nbsp;you configuring ANY as a source ip&amp;nbsp;going to untrust zone. Let's say your untrust interface has 92.16.0.1/24 ip&amp;nbsp;address assigned. ANY means any&amp;nbsp;ip addresses, even outside of this subnet&amp;nbsp;are allowed (e.g 84.8.9.1, 74.8.6.1 etc).&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2017 19:37:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157262#M51590</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-18T19:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: Source zone - source address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157495#M51649</link>
      <description>&lt;P&gt;these rules were migrated over from and ASA 5510 before I even got here, and I agree the fewer the any's the better. &amp;nbsp;But if you have a range of IP's addressed to the Source Zone, doesn't the any under IP addresses only mean any of the IP's configured on the Zone?&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2017 19:26:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157495#M51649</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-05-19T19:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: Source zone - source address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157496#M51650</link>
      <description>&lt;P&gt;No, a zone is a logical area and you will have at least one interface in that zone.&amp;nbsp;So you have one interface in the&amp;nbsp;zone. That interface connected to the router, then we do have another router and so on.&amp;nbsp;Routers always interconnect networks (different networks/subnets). &amp;nbsp;With configuration "any" firewall will allow any source&amp;nbsp;ip&amp;nbsp;coming into that interface, as l said earlier even from the outside of the&amp;nbsp;interface subnet. If you have multiple interfaces withing the same zone, any ip&amp;nbsp;outside the&amp;nbsp;zone. So ip address not &lt;SPAN&gt;necessarily&amp;nbsp;&lt;/SPAN&gt;should be directly connected to the PA, but logically they will be in the same zone.&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2017 19:55:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157496#M51650</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-19T19:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: Source zone - source address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157508#M51655</link>
      <description>&lt;P&gt;It also depends on your routing table.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So let's assume you have interface eth1/1 in zone "INTERNAL". All your internal networks are somewhere in 10.0.0.0/8 and are reachable through an internal router. To keep the routing easy you have one route for the 10.0.0.0/8 network towards your router.&lt;/P&gt;&lt;P&gt;Now if there somehow traffic from 192.168.100.100 arrives at your firewall on eth1/1 (Zone INTERNAL), then this traffic is not allowed even you have allowed "any" in the source address column and INTERNAL as source zone in your security policy. This packet (and everything else which does not come from 10.0.0.0/8) will get dropped as ip spoof attack.&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2017 19:58:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157508#M51655</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-19T19:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: Source zone - source address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157565#M51665</link>
      <description>&lt;P&gt;To be exact IP spoof attack is not detected by default but only if zone protection is applied to the zone and ip spoof checkbox checked (it is best practice to have it configured).&lt;/P&gt;</description>
      <pubDate>Sun, 21 May 2017 03:07:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157565#M51665</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-21T03:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: Source zone - source address</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157568#M51666</link>
      <description>&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt; : of course, you're absolutely right. Sometimes the "best practices" are more/(too much) "must" settings to me &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;</description>
      <pubDate>Sun, 21 May 2017 07:35:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-zone-source-address/m-p/157568#M51666</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-21T07:35:13Z</dc:date>
    </item>
  </channel>
</rss>

