<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RFC1918 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/rfc1918/m-p/177710#M55392</link>
    <description>&lt;P&gt;I usually block trust to untrust RFC1918.&lt;/P&gt;&lt;P&gt;Although ISP routers drop it anyway I like to keep it clean.&lt;/P&gt;&lt;P&gt;It is really common for many applications like Skype for example to scan internal ranges for peers.&lt;/P&gt;</description>
    <pubDate>Tue, 19 Sep 2017 20:52:10 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2017-09-19T20:52:10Z</dc:date>
    <item>
      <title>RFC1918</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rfc1918/m-p/177700#M55391</link>
      <description>&lt;P&gt;Basic trust to untrust policy I see internal address sending snmp to addresses like 10.0.0.1, 192.168.1.x.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do people create a policy to block internal traffic going to RFC1918 on the untrusted interface?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 20:28:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rfc1918/m-p/177700#M55391</guid>
      <dc:creator>s.williams1</dc:creator>
      <dc:date>2017-09-19T20:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: RFC1918</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rfc1918/m-p/177710#M55392</link>
      <description>&lt;P&gt;I usually block trust to untrust RFC1918.&lt;/P&gt;&lt;P&gt;Although ISP routers drop it anyway I like to keep it clean.&lt;/P&gt;&lt;P&gt;It is really common for many applications like Skype for example to scan internal ranges for peers.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 20:52:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rfc1918/m-p/177710#M55392</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-09-19T20:52:10Z</dc:date>
    </item>
    <item>
      <title>Re: RFC1918</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rfc1918/m-p/524298#M108490</link>
      <description>&lt;P&gt;Do you have the one line policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Trust to untrust&amp;nbsp; ( the builtin PAN addresses appear confusing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;TrRUST or INSIDE zones&lt;/P&gt;
&lt;P&gt;ANY&lt;/P&gt;
&lt;P&gt;UNTRUST&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;10.0.0.0&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;–&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;10.255.255.255&amp;nbsp; (10/8 prefix)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;172.16.0.0&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;–&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;172.31.255.255&amp;nbsp; (172.16/12 prefix)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;192.168.0.0&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;–&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;192.168.255.255 (192.168/16 prefix)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Action Block/deny&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;This is&amp;nbsp; the first policy I believe&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2022 22:11:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rfc1918/m-p/524298#M108490</guid>
      <dc:creator>JimDeMayo</dc:creator>
      <dc:date>2022-12-15T22:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: RFC1918</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rfc1918/m-p/524887#M108580</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;If you follow a DENY ALL allow by exception methodology, just put a DENY ALL policy at the bottom of the Security Policies. This way only traffic that you 'allow' is allowed to go between zones, etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 19:52:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rfc1918/m-p/524887#M108580</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-12-22T19:52:12Z</dc:date>
    </item>
  </channel>
</rss>

