<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sophos Install &amp;amp; Updates From DMZ in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/sophos-install-amp-updates-from-dmz/m-p/158868#M52024</link>
    <description>&lt;P&gt;Create test policy with any any in the app and&amp;nbsp;services&amp;nbsp;and test with one of the&amp;nbsp;source machine&amp;nbsp;ip&amp;nbsp;(restrict the&amp;nbsp;policy for the source ip of your test machine). Do not attach any security&amp;nbsp;profiles yet! Then monitor the&amp;nbsp;traffic to confirm if everything is allowed etc and if it even works with the&amp;nbsp;plain policy. Then start adding additional futures (e.g security profiles). Still, works? Good. Then start restricting policy based on app and services.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 01 Jun 2017 11:47:29 GMT</pubDate>
    <dc:creator>TranceforLife</dc:creator>
    <dc:date>2017-06-01T11:47:29Z</dc:date>
    <item>
      <title>Sophos Install &amp; Updates From DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sophos-install-amp-updates-from-dmz/m-p/158791#M51991</link>
      <description>&lt;P&gt;Anyone create a policy allowing a Sophos AV install and then Updates form a DMZ? I have created such a policy but still seems to be an issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The security policy has all the source and destination zones and the destination host are any.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am then allowing the following applications (not using ports at all)&lt;/P&gt;&lt;P&gt;dns&lt;/P&gt;&lt;P&gt;ms-ds-smb&lt;/P&gt;&lt;P&gt;msrpc&lt;/P&gt;&lt;P&gt;netbios-cc&lt;/P&gt;&lt;P&gt;sophos-live-p...&lt;/P&gt;&lt;P&gt;sophos-rms&lt;/P&gt;&lt;P&gt;sophos-update&lt;/P&gt;&lt;P&gt;netbios-ss&lt;/P&gt;&lt;P&gt;ssl&lt;/P&gt;&lt;P&gt;web-browsing&lt;/P&gt;&lt;P&gt;tcp-over-tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If anyone is doing this please update me on how you are doing this securly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2017 16:01:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sophos-install-amp-updates-from-dmz/m-p/158791#M51991</guid>
      <dc:creator>Doug_Hogue</dc:creator>
      <dc:date>2017-05-31T16:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: Sophos Install &amp; Updates From DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sophos-install-amp-updates-from-dmz/m-p/158793#M51993</link>
      <description>&lt;P&gt;So what do you see in the monitoring tab&amp;nbsp;when forcing the&amp;nbsp;Sophos AV from the DMZ zone to&amp;nbsp;get and install updates? What policy your traffic is hitting?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2017 16:13:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sophos-install-amp-updates-from-dmz/m-p/158793#M51993</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-31T16:13:48Z</dc:date>
    </item>
    <item>
      <title>Re: Sophos Install &amp; Updates From DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sophos-install-amp-updates-from-dmz/m-p/158798#M51996</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20175"&gt;@Doug_Hogue&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You'll need to actually monitor the traffic and see why it isn't being allowed. My guess would be that either one of the app-ids are using a non-standard port, you don't have an application listed that Sophos is trying to use, or something with your routing from your DMZ zone is not correct.&lt;/P&gt;&lt;P&gt;I would start with the basics and just verify that you can talk to the server serving up the updates, then look at the monitor tab and see what is getting blocked. You may want to turn on logging for your interzone-default policy for the time being just to make sure that if it's hitting that rule you'll actually get logging for it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2017 17:09:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sophos-install-amp-updates-from-dmz/m-p/158798#M51996</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-05-31T17:09:07Z</dc:date>
    </item>
    <item>
      <title>Re: Sophos Install &amp; Updates From DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sophos-install-amp-updates-from-dmz/m-p/158801#M51998</link>
      <description>&lt;P&gt;Yes I have already monitored the traffic and that is how I came up with the policy I have. I was looking for the experience of others and if their poloicy was different. Their may be some other restrictions such as url filtering and such going on here that is preventing the traffic through. Thanks for your thoughts.&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2017 17:45:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sophos-install-amp-updates-from-dmz/m-p/158801#M51998</guid>
      <dc:creator>Doug_Hogue</dc:creator>
      <dc:date>2017-05-31T17:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: Sophos Install &amp; Updates From DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sophos-install-amp-updates-from-dmz/m-p/158868#M52024</link>
      <description>&lt;P&gt;Create test policy with any any in the app and&amp;nbsp;services&amp;nbsp;and test with one of the&amp;nbsp;source machine&amp;nbsp;ip&amp;nbsp;(restrict the&amp;nbsp;policy for the source ip of your test machine). Do not attach any security&amp;nbsp;profiles yet! Then monitor the&amp;nbsp;traffic to confirm if everything is allowed etc and if it even works with the&amp;nbsp;plain policy. Then start adding additional futures (e.g security profiles). Still, works? Good. Then start restricting policy based on app and services.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 11:47:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sophos-install-amp-updates-from-dmz/m-p/158868#M52024</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-06-01T11:47:29Z</dc:date>
    </item>
  </channel>
</rss>

