<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Untrust to Untrust in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust/m-p/184933#M56654</link>
    <description>&lt;P&gt;Should the untrust to untrust be denied. As the defalt interzone traffic allows everything.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;untrust to untrust rules for us are ether used for IPSEC or global protect. It seems to me blocking this traffic effects detecting SCANS.&lt;/P&gt;</description>
    <pubDate>Wed, 01 Nov 2017 15:46:47 GMT</pubDate>
    <dc:creator>raji_toor</dc:creator>
    <dc:date>2017-11-01T15:46:47Z</dc:date>
    <item>
      <title>Untrust to Untrust</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust/m-p/184933#M56654</link>
      <description>&lt;P&gt;Should the untrust to untrust be denied. As the defalt interzone traffic allows everything.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;untrust to untrust rules for us are ether used for IPSEC or global protect. It seems to me blocking this traffic effects detecting SCANS.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2017 15:46:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust/m-p/184933#M56654</guid>
      <dc:creator>raji_toor</dc:creator>
      <dc:date>2017-11-01T15:46:47Z</dc:date>
    </item>
    <item>
      <title>Re: Untrust to Untrust</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust/m-p/184961#M56658</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56221"&gt;@raji_toor&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I've always added a explicit deny rule into the configuration for untrust to untrust traffic, and then allowed the traffic if/when needed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2017 17:41:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust/m-p/184961#M56658</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-11-01T17:41:23Z</dc:date>
    </item>
    <item>
      <title>Re: Untrust to Untrust</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust/m-p/185486#M56739</link>
      <description>&lt;P&gt;You mean intrazone-default, not interzone-default &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;It's a good idea to create a more specific drop rule or at least override the non-logging Default Rules, because setting logging options can be extremely useful to see what's going on.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Nov 2017 18:05:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust/m-p/185486#M56739</guid>
      <dc:creator>BenLassila</dc:creator>
      <dc:date>2017-11-04T18:05:24Z</dc:date>
    </item>
  </channel>
</rss>

