<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall Policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-policy/m-p/191974#M57736</link>
    <description>&lt;P&gt;Thanks for your advise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured with both zones as untrust, but not working. While checking from Rule-50 log, I noticed all traffics are denied. If I open Rule-20 log viewer, no traffic there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any rule need to be created before Rule-50, for return traffic from destination to source to accept for Rule-20.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 17 Dec 2017 10:55:03 GMT</pubDate>
    <dc:creator>meshbah</dc:creator>
    <dc:date>2017-12-17T10:55:03Z</dc:date>
    <item>
      <title>Firewall Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-policy/m-p/191965#M57734</link>
      <description>&lt;P&gt;I am working to configure our new Palo Alto Firewall. In the policy section, I have configured one policy to allow RDP service (3389) using souce &amp;amp; destinaion IP address (Rule-20) and configured another rule (Rule-50) to deny all traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is the summary of config-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule-20:&lt;/P&gt;&lt;P&gt;Source IP: 192.168.10.20&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Dest IP: 192.168.15.20&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;App: RDP (3389)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Action: Allow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule-50:&lt;/P&gt;&lt;P&gt;Source IP:&amp;nbsp;any&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Dest IP:&amp;nbsp;any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;App:&amp;nbsp;any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Action: Deny&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But, the traffic policy is not working. I thin, there should one rule for the return traffic. But, I am unable to configure it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Need your advise to fix it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Meshbah&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Dec 2017 08:48:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-policy/m-p/191965#M57734</guid>
      <dc:creator>meshbah</dc:creator>
      <dc:date>2017-12-17T08:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-policy/m-p/191973#M57735</link>
      <description>&lt;P&gt;If you are passing traffic from untrust to trust zones you are also going to need a NAT rule as well as the security rule to make this work.&lt;/P&gt;&lt;P&gt;It would be a like this.&lt;/P&gt;&lt;P&gt;Source zone and destination zone = both untrust&lt;/P&gt;&lt;P&gt;Destination address = 192.168.10.20&lt;/P&gt;&lt;P&gt;Service RDP tcp port 3389 ( you may need to create this in objects, services)&lt;/P&gt;&lt;P&gt;Destination translation = 192.168.15.20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is assuming these are on different network subnets.&lt;/P&gt;</description>
      <pubDate>Sun, 17 Dec 2017 10:07:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-policy/m-p/191973#M57735</guid>
      <dc:creator>ChrisRead</dc:creator>
      <dc:date>2017-12-17T10:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-policy/m-p/191974#M57736</link>
      <description>&lt;P&gt;Thanks for your advise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured with both zones as untrust, but not working. While checking from Rule-50 log, I noticed all traffics are denied. If I open Rule-20 log viewer, no traffic there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any rule need to be created before Rule-50, for return traffic from destination to source to accept for Rule-20.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Dec 2017 10:55:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-policy/m-p/191974#M57736</guid>
      <dc:creator>meshbah</dc:creator>
      <dc:date>2017-12-17T10:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-policy/m-p/191979#M57737</link>
      <description>&lt;P&gt;If your traffic is missing rule 20 and hitting your deny all at rule 50, There is something about your traffic that done not match rule 20. Make sure the service you specified in the NAT rule is also added to the security rule.&lt;/P&gt;&lt;P&gt;The NAT rule is untrust to untrust and the security rule is untrust to trust.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Sun, 17 Dec 2017 15:51:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-policy/m-p/191979#M57737</guid>
      <dc:creator>ChrisRead</dc:creator>
      <dc:date>2017-12-17T15:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-policy/m-p/192008#M57742</link>
      <description>&lt;P&gt;I may be missing something but your original post does not mention this is a connection coming from outside, so am wondering if NAT is even necessary?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you check your log file to see which zones are associated with 192.168.10.20 and 192.168.15.20? you may need to set the correct zones in your policy (this is a zone based firewall so zones are very important)&lt;/P&gt;
&lt;P&gt;How did you set the service in your rules? application default or a specific service&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FYI you don't need to create return rules, every flow is created bidirectionally and will accept returning packets automatically&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 07:33:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-policy/m-p/192008#M57742</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-12-18T07:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-policy/m-p/192022#M57744</link>
      <description>&lt;P&gt;&lt;SPAN&gt;It works now. I had created a application rule based on destination port, which was not compatible. However, there was already built in app on required port. After configured on that app, it works now. Thanks for your support.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 08:40:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-policy/m-p/192022#M57744</guid>
      <dc:creator>meshbah</dc:creator>
      <dc:date>2017-12-18T08:40:40Z</dc:date>
    </item>
  </channel>
</rss>

