<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to block unknown machines from traversing the network in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180532#M55873</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;I appreciate all the help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I figured it would be an uphill battle with this specific task. I appreciate all the help and insight into my issue. I will update you all with what happens going forward &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 06 Oct 2017 13:00:50 GMT</pubDate>
    <dc:creator>Roshawn</dc:creator>
    <dc:date>2017-10-06T13:00:50Z</dc:date>
    <item>
      <title>How to block unknown machines from traversing the network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180412#M55852</link>
      <description>&lt;P&gt;Hi all. My question is how can I create a rule that blocks traffic from a computer I brought from home as opposed to from my work domain?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to be able to see&amp;nbsp;people that bring their own devices onto the network and then block access to the network as a whole. Is this do-able without Captive Portal?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would be appreciated &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Oct 2017 22:45:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180412#M55852</guid>
      <dc:creator>Roshawn</dc:creator>
      <dc:date>2017-10-05T22:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to block unknown machines from traversing the network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180442#M55855</link>
      <description>&lt;P&gt;Do you have UserID configured for work domain?&lt;/P&gt;&lt;P&gt;If yes then you can deny unknown users from accessing internal resources and internet (I would still permit to update applications so computers can download updates even if no-one has logged in).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You don't need to use Captive Portal for work domain as there are so many diferent options to get UserID.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="User-ID.png" style="width: 586px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11771i99A582E4D7F862AC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="User-ID.png" alt="User-ID.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 01:25:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180442#M55855</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-10-06T01:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to block unknown machines from traversing the network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180460#M55856</link>
      <description>&lt;P&gt;THANK YOU!!&lt;BR /&gt;&lt;BR /&gt;I do have user-id up and running and I thought that I created a rule to make the Source User that is Unknown denied to all zones, but that didn't work. I was able to bring a home machine in and surf the network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Essentially my rule said:&lt;BR /&gt;Source Zone: Trust&lt;BR /&gt;Source IP: ANY&lt;BR /&gt;Destination Zone: Trust&lt;BR /&gt;Destination IP: ANY&lt;BR /&gt;User: Unknown&lt;BR /&gt;Application: Any&lt;BR /&gt;Service: Any&lt;BR /&gt;&lt;BR /&gt;I know I'm missing something. Hoping I can get there tomorrow &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 02:29:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180460#M55856</guid>
      <dc:creator>Roshawn</dc:creator>
      <dc:date>2017-10-06T02:29:31Z</dc:date>
    </item>
    <item>
      <title>Re: How to block unknown machines from traversing the network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180461#M55857</link>
      <description>&lt;P&gt;You should allow any user to get dhcp, dns and access domain controllers to authenticate before you block to anything else.&lt;/P&gt;&lt;P&gt;Also what are your test machine and destination machine IPs?&lt;/P&gt;&lt;P&gt;If they are in same subnet then this traffic does not pass firewall.&lt;/P&gt;&lt;P&gt;Do you have seperate zones to test with? For example from users zone to servers zone.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 03:19:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180461#M55857</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-10-06T03:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to block unknown machines from traversing the network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180463#M55859</link>
      <description>&lt;P&gt;I am allowing all users to get ot dhcp, dns, and access domain controllers to authenticate but I'm als obeing told to not do Captive Portal &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;I have two machines (one domain joined and one from home) and both can get on the network and go anywhere.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have three zones to test with and then the Untrusted Zone&amp;gt;&lt;BR /&gt;&lt;BR /&gt;I thought by setting the action to Deny for Uknown Users in every zone that I would be able to get it taken care of that way. However, that didn't work. Now I'm thinking it is because I had the rule before the DNS, DHCP, WINS, and Domain Controller rules.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 03:56:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180463#M55859</guid>
      <dc:creator>Roshawn</dc:creator>
      <dc:date>2017-10-06T03:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to block unknown machines from traversing the network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180467#M55860</link>
      <description>&lt;P&gt;In your initial example both Source and Destination zones were the same.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Source Zone: Trust&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Destination Zone: Trust&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In this case traffic usually does not pass firewall as traffic inside same subnet goes from source to destination through switch not firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Change destination zone to Untrust and try to access internet.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Did similar test and works fine.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ping 1.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11774i74D661AE4609A3EA/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ping 1.PNG" alt="ping 1.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ping 2.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11775i2D5A0A066716D4F9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ping 2.PNG" alt="ping 2.PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 04:36:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180467#M55860</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-10-06T04:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to block unknown machines from traversing the network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180506#M55864</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42805"&gt;@Roshawn&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I might be going overboard here but you could configure a HIP-based policy enforcement to do this.&lt;/P&gt;
&lt;P&gt;That said, it requires additional licenses and requires quite a bit of extra configuration :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/71/globalprotect/globalprotect-admin-guide/use-host-information-in-policy-enforcement" target="_blank"&gt;Use host information in policy enforcement&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;-Kiwi&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 08:43:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180506#M55864</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2017-10-06T08:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to block unknown machines from traversing the network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180528#M55870</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42805"&gt;@Roshawn&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;It honestly sounds like your asking a little bit too much from your firewall, as far as blocking interzone communication goes. The way that&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;mentioned works great as long as the firewall can see the traffic. The example rule that you have laid out really isn't going to work as the traffic from 'Trust' to 'Trust', or any interzone traffic in general, isn't going to traverse the firewall in&amp;nbsp;&lt;EM&gt;most&lt;/EM&gt; situations.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So as an example lets say I have the following zones on my firewall 'Untrust', 'Trust', 'DMZ', and a 'Datacenter' zone. The rules that I would really want to be put into the firewall would look something like this.&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;set rulebase security rules Test from Trust to [ Untrust DMZ Datacenter ] source any source-user unknown destination any action deny log-end yes&lt;/PRE&gt;&lt;P&gt;The above rule would deny any traffic that isn't tied to a user id from accessing the untrust, DMZ, or Datacenter zones. You could put your Trust zone in this rule as well, but again in most situations you won't see any Trust to Trust traffic anyways.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Depending on how the rest of your network looks, you could then go through and make the same rule but set the from or source zone as another zone. I would be a bit more careful when doing this as things like the DMZ zone may not actually have a user-id associated with the servers, same for the Datacenter zone. Essentially when doing this you need to be sure that the zone your are disallowing without a user-id mapping, doesn't actually contain any devices that wouldn't serve a user-id and are still expected to maintain connectivity.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 12:48:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180528#M55870</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-10-06T12:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to block unknown machines from traversing the network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180532#M55873</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;I appreciate all the help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I figured it would be an uphill battle with this specific task. I appreciate all the help and insight into my issue. I will update you all with what happens going forward &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 13:00:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180532#M55873</guid>
      <dc:creator>Roshawn</dc:creator>
      <dc:date>2017-10-06T13:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to block unknown machines from traversing the network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180560#M55878</link>
      <description>&lt;P&gt;We looked at this scenario and found that a prodcut like Cisco ISE or similar Network Access Control product would do this.&amp;nbsp; Cost prohibitive for us, so we just have to live with it for now.&amp;nbsp; I would much prefer to know who is coming and going on the wired / wireless networks here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 14:09:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180560#M55878</guid>
      <dc:creator>dannon</dc:creator>
      <dc:date>2017-10-06T14:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to block unknown machines from traversing the network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180573#M55880</link>
      <description>&lt;P&gt;You could force intrazone traffic through firewall with private vlans but they can cause other issues.&lt;/P&gt;&lt;P&gt;For example I could not get Lync working with private vlans some years ago and looks like Lync was not designed to work that way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A title="https://social.technet.microsoft.com/Forums/ie/en-US/a41db525-f206-412d-8b24-3a6ff3f7efc8/lync-and-private-vlans?forum=lyncinterop" href="https://social.technet.microsoft.com/Forums/ie/en-US/a41db525-f206-412d-8b24-3a6ff3f7efc8/lync-and-private-vlans?forum=lyncinterop" target="_blank"&gt;https://social.technet.microsoft.com/Forums/ie/en-US/a41db525-f206-412d-8b24-3a6ff3f7efc8/lync-and-private-vlans?forum=lyncinterop&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Oct 2017 15:53:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-block-unknown-machines-from-traversing-the-network/m-p/180573#M55880</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-10-06T15:53:58Z</dc:date>
    </item>
  </channel>
</rss>

