<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Trust and Untrust on same interface in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/trust-and-untrust-on-same-interface/m-p/192871#M57895</link>
    <description>&lt;P&gt;I am pretty new to the Palo Alto's so I have a questions that will be pretty easy to answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am setting up a PA-820 in Virtual Wire and we have both Trusted and Untrusted networks on the same interface from the router.&amp;nbsp; The External interface is the route to the internet but is also the route to all our branches through GRE Tunnels.&amp;nbsp; What would be the best way to setup secuirty policies that protect against internet traffic but allow the 10.0.0.0 network.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 22 Dec 2017 14:45:27 GMT</pubDate>
    <dc:creator>Nathan.Gooding</dc:creator>
    <dc:date>2017-12-22T14:45:27Z</dc:date>
    <item>
      <title>Trust and Untrust on same interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trust-and-untrust-on-same-interface/m-p/192871#M57895</link>
      <description>&lt;P&gt;I am pretty new to the Palo Alto's so I have a questions that will be pretty easy to answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am setting up a PA-820 in Virtual Wire and we have both Trusted and Untrusted networks on the same interface from the router.&amp;nbsp; The External interface is the route to the internet but is also the route to all our branches through GRE Tunnels.&amp;nbsp; What would be the best way to setup secuirty policies that protect against internet traffic but allow the 10.0.0.0 network.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Dec 2017 14:45:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trust-and-untrust-on-same-interface/m-p/192871#M57895</guid>
      <dc:creator>Nathan.Gooding</dc:creator>
      <dc:date>2017-12-22T14:45:27Z</dc:date>
    </item>
    <item>
      <title>Re: Trust and Untrust on same interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trust-and-untrust-on-same-interface/m-p/192900#M57900</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/79606"&gt;@Nathan.Gooding&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Interesting. You won't be able to seperate them into logical zones then, since you can only put one zone on an interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I imagine that you would simply be more strict between source/destination addresses than someone who could simply specify a zone, and that you'll likely use a pretty fair amount of the negate option. Any policy that you make for protecting against outside connections you could negate the 10.0.0.0/8 network so that those policies simply wouldn't apply to anything within that range.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Dec 2017 16:21:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trust-and-untrust-on-same-interface/m-p/192900#M57900</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-12-22T16:21:22Z</dc:date>
    </item>
    <item>
      <title>Re: Trust and Untrust on same interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trust-and-untrust-on-same-interface/m-p/193510#M58006</link>
      <description>&lt;P&gt;Are your GRE tunnels going through some WAN connection or concentrator?&lt;/P&gt;
&lt;P&gt;If your environment is on managed switches you could set the internet to one VLAN and your GRE output to another, then create tagged sub-interfaces for your vwire. Each sub-interface can have it's own zone, so you'd be able to do just that (then bridge the vlans behind your vwire)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could also switch to a layer2 layout and have the firewall act as a switch rather than a router or a tube. You'd be able to put each of your 3 areas in a layer2 zone and bridge them all and apply security policies between the zones&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your GRE tunnels are terminated behind the firewall on the inside (it's not clear where you are terminating the tunnels) you can simply allow GRE from untrust to trust and/or trust to untrust&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;otherwise &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;'s solution is the way to go: differentiate between anything with 10.0.0.0 negated, or specifically for source/destination 10.0.0.0&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jan 2018 14:55:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trust-and-untrust-on-same-interface/m-p/193510#M58006</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-02T14:55:47Z</dc:date>
    </item>
  </channel>
</rss>

