<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: The dreaded any in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/186052#M56841</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I actually have quite a few rules that don't mention a single 'any' statement (including HIP this goes down to a few), to the point where if I use an 'any' anywhere in a security policy I spend more time creating justification for it then creating it. Zone I always specify, address is always specified even if it's the entire range in that zone, user is always at least known-user, destiantion is almost always filled, applications specified, services specified or application-default.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are obviously times where you can't get away without an 'any' statement. For example general browsing rules are almost always going to specify an 'untrust' destiantion zone but include an 'any' as the destiantion. Source-user is really something that should mostly be populated if you expect to see user ids across your network; why allow an unknown user access anything? Part of it to is how many rules you actually have; on average I run between 250-300 rules, I've worked on firewalls that had over a thousand. Once you get that specific with your equipment, it would kind of be really unusual to see an 'any' statement in some of those policies.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Nov 2017 21:58:27 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2017-11-08T21:58:27Z</dc:date>
    <item>
      <title>The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185786#M56796</link>
      <description>&lt;P&gt;I got a health check report and according to it I have a least one any in every single rule I have on my firewall. I was just curious if anyone&amp;nbsp; has been able to have at least one or more rules with no any's at all.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 17:24:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185786#M56796</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-11-07T17:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185817#M56799</link>
      <description>&lt;P&gt;Yup, I have a few (excluding HIP profile) you just specify your zone, and source address, or source networks, Destination zone and networks, you can select multiple of any of these. Specify users (I do groups in AD)Then specify the applications or application filters, and there you go, a rule with no "ANYs".&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 20:20:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185817#M56799</guid>
      <dc:creator>Kaje</dc:creator>
      <dc:date>2017-11-07T20:20:56Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185818#M56800</link>
      <description>&lt;P&gt;Hmmmm... interesting question and even more interesting first response, not sure why you would specify a source ip address and a source zone, or a destination ip and destination zone, unless i am missing something obvious, but of course if you can then why not?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;on call at the mo and a bit bored so let me offer a curve ball, does anybody have a rule that consists of all “Any”. I must admit that i do.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 20:55:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185818#M56800</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-11-07T20:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185819#M56801</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Its a tough one and I&amp;nbsp; begin to wonder what your rule number would have to be to eliminate all your any's. I was just surprised that we didn't even have one rule without any's&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 20:58:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185819#M56801</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-11-07T20:58:32Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185820#M56802</link>
      <description>&lt;P&gt;The reason to do both Zone and IP, is firewall with many zones, and possibly multiple virtual routers!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I personally dont have a problem with an ANY in the right spot, some times you really dont need to be that specific. some rules, you need to get VERY specific!&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 21:05:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185820#M56802</guid>
      <dc:creator>Kaje</dc:creator>
      <dc:date>2017-11-07T21:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185825#M56803</link>
      <description>&lt;P&gt;I believe that best practices indicate having as specific a rule as possible for higher security, but obviously that isn't always possible&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 21:34:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185825#M56803</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-11-07T21:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185826#M56804</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/59867"&gt;@Kaje&lt;/a&gt;.. noted, and of course you are correct... &amp;nbsp;my fault for assuming all networks were like ours.. private, external and dmz. With one vrouter.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i agree with using “any” where possible as always assumed that any implies “do nothing” thus less load on processing and easier diagnostics.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;shame you are not using HIP, you could have hit the jackpot...&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 21:36:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185826#M56804</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-11-07T21:36:51Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185827#M56805</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;... strange you should say that.... we also have policies tied down to AD users and groups that can only traverse via the trusted interface, purely because of our setup, so... its wierd that we still add the trusted zone (but not ip subnets) to our policies, whereas we could just rely on AD. Must be a habit/confidence thing...&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 21:53:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185827#M56805</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-11-07T21:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185928#M56817</link>
      <description>&lt;P&gt;and yes our ANY ANY ANY ANY ANY ANY ANY rule is the last. it's set to deny for diagnostics. I find this quite helpful as our other policies are logging session end only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we do not log the above rule to paranormal for obvious reasons...&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2017 08:51:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185928#M56817</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-11-08T08:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185973#M56824</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;you can override the default inter-zone deny rule (panos 6.1 and above) and set the log action to get the information from a 'deny all' rule. Currently your rule would deny intra-zone traffic as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2017 11:50:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185973#M56824</guid>
      <dc:creator>bmorris1</dc:creator>
      <dc:date>2017-11-08T11:50:45Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185974#M56825</link>
      <description>&lt;P&gt;noted &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5403"&gt;@bmorris1&lt;/a&gt;. thankyou.&lt;/P&gt;&lt;P&gt;we don't have inter-zone traffic so seems OK for me, that may be simply because i don't fully understand inter-zoney stuff....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;google.... incoming..&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2017 12:16:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/185974#M56825</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-11-08T12:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/186052#M56841</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I actually have quite a few rules that don't mention a single 'any' statement (including HIP this goes down to a few), to the point where if I use an 'any' anywhere in a security policy I spend more time creating justification for it then creating it. Zone I always specify, address is always specified even if it's the entire range in that zone, user is always at least known-user, destiantion is almost always filled, applications specified, services specified or application-default.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are obviously times where you can't get away without an 'any' statement. For example general browsing rules are almost always going to specify an 'untrust' destiantion zone but include an 'any' as the destiantion. Source-user is really something that should mostly be populated if you expect to see user ids across your network; why allow an unknown user access anything? Part of it to is how many rules you actually have; on average I run between 250-300 rules, I've worked on firewalls that had over a thousand. Once you get that specific with your equipment, it would kind of be really unusual to see an 'any' statement in some of those policies.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2017 21:58:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/186052#M56841</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-11-08T21:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/186054#M56842</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;It's been a while since I've seen a medium sized company have a 'true' DMZ. I've seen more and more traffic go through a load-balancer that's in the DMZ, but then accesses internal servers for content. Makes me want to scream when people don't understand what the DMZ is supposed to be used for.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2017 22:01:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/186054#M56842</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-11-08T22:01:02Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/186235#M56859</link>
      <description>&lt;P&gt;We have 377 rules right now and I have always been told that it is a more secure rule if you can minimize or eliminate the any's, so when the health check we had run by PA showed everyone of our rules had at least one any in it, that caught me off guard. So I am always looking for way to eliminate any's and make the rules more specific&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2017 14:08:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/186235#M56859</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-11-09T14:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: The dreaded any</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/188717#M57234</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;You probably have the ruleset(s) I'd like to have. But don't forget to specify also the "url category" column to get a rule without "any" &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But unfortunately it heavily depends on the customer ... user-id? "Yes please, but as a nice to have not a must" ... app-id? "Just go with port 80 and 443, because we don't wan't to upset our employees" ... Anyway, I think it definately isn't that critical if you have any in the rules at least for general client access rules (active directory, exchange, fileservices, ... , internet) (-&amp;gt;with strict source routing enabled in ZP profile, I don't see a reason for specifying addresses when you want to allow this whole zone to access some ressources)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Nov 2017 18:09:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/the-dreaded-any/m-p/188717#M57234</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-11-26T18:09:26Z</dc:date>
    </item>
  </channel>
</rss>

