<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restrict Any Any from Security Policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-any-any-from-security-policy/m-p/160279#M52266</link>
    <description>&lt;P&gt;this article looks promising:&amp;nbsp;&lt;A href="https://popravak.wordpress.com/2014/08/27/palo-alto-ngfw-use-case-one-monitoring-traffic-tap-mode/" target="_blank"&gt;https://popravak.wordpress.com/2014/08/27/palo-alto-ngfw-use-case-one-monitoring-traffic-tap-mode/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's unfortunate now i cant identify zones too easily. But I can make intelligent guesses based on source/dest ips.&lt;/P&gt;</description>
    <pubDate>Thu, 08 Jun 2017 20:18:04 GMT</pubDate>
    <dc:creator>nicford</dc:creator>
    <dc:date>2017-06-08T20:18:04Z</dc:date>
    <item>
      <title>Restrict Any Any from Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-any-any-from-security-policy/m-p/160271#M52264</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At one of our sites we fell vicitim and have the dreaded any any security policy in place. We are trying to determine the best course of action to lock it down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would I create tap firewall ports and span all the traffic, then create new rules based on it in tap zones?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any guides out them to assist for this specific situation?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 20:15:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-any-any-from-security-policy/m-p/160271#M52264</guid>
      <dc:creator>nicford</dc:creator>
      <dc:date>2017-06-08T20:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Any Any from Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-any-any-from-security-policy/m-p/160278#M52265</link>
      <description>&lt;P&gt;Check Monitor tab or run reports to see what applications pass this firewall.&lt;/P&gt;&lt;P&gt;Create rule to permit those applications you want.&lt;/P&gt;&lt;P&gt;You can also create second rule for known bad above any any.&lt;/P&gt;&lt;P&gt;Eventually nothing should hit any any rule and you can remove it.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 20:16:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-any-any-from-security-policy/m-p/160278#M52265</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-06-08T20:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Any Any from Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-any-any-from-security-policy/m-p/160279#M52266</link>
      <description>&lt;P&gt;this article looks promising:&amp;nbsp;&lt;A href="https://popravak.wordpress.com/2014/08/27/palo-alto-ngfw-use-case-one-monitoring-traffic-tap-mode/" target="_blank"&gt;https://popravak.wordpress.com/2014/08/27/palo-alto-ngfw-use-case-one-monitoring-traffic-tap-mode/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's unfortunate now i cant identify zones too easily. But I can make intelligent guesses based on source/dest ips.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 20:18:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-any-any-from-security-policy/m-p/160279#M52266</guid>
      <dc:creator>nicford</dc:creator>
      <dc:date>2017-06-08T20:18:04Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Any Any from Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-any-any-from-security-policy/m-p/160295#M52271</link>
      <description>&lt;P&gt;Can you explain if Palo is in place and inline already as firewall or you have some legacy firewall and you want to put Palo into tap mode to listen what is going on?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 21:02:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-any-any-from-security-policy/m-p/160295#M52271</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-06-08T21:02:54Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Any Any from Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-any-any-from-security-policy/m-p/160297#M52272</link>
      <description>&lt;P&gt;Such as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;said you need to slowly start chipping away at the rule by monitoring what's actually hitting the any any rule. Eventually it will get to the point where you can delete it and use it as a learning experiance of "this is why you don't do it like this, it took me weeks to fix it". Have fun!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;edit: You do realize that if you put it in tap mode you can't act on the traffic right?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 21:04:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-any-any-from-security-policy/m-p/160297#M52272</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-06-08T21:04:47Z</dc:date>
    </item>
  </channel>
</rss>

