<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: specific blocked IP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210124#M61395</link>
    <description>&lt;DIV class="lia-quilt-row lia-quilt-row-forum-message-main"&gt;&lt;DIV class="lia-quilt-column lia-quilt-column-20 lia-quilt-column-right lia-quilt-column-main-right"&gt;&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-right"&gt;&lt;DIV class="lia-message-body lia-component-body"&gt;&lt;DIV class="lia-message-body-content"&gt;&lt;P&gt;"test security-policy-match" will find the rule on the firewall that will block a flow.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Of course, the firewall never sees "just" an IP address out of context.... it will also see source/destination IPs, source/destination ports, protocols, etc.&amp;nbsp; The "test security-policy-match" requires that information in order to determine whether or not it would block that flow.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Changing any one of those variables (src/dst address/port, protocol, app) will affect the firewall's decision to allow/deny.&amp;nbsp; For example, let's say you have only two firewall rules:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;rule1:&amp;nbsp; permit from x.x.x.x to "any ip" on udp/53&amp;nbsp;&lt;/P&gt;&lt;P&gt;rule2:&amp;nbsp; deny all traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your question is will "x.x.x.x" be blocked?&amp;nbsp; If it meets the additional conditions to match rule #1, then no, it won't be blocked.&amp;nbsp; If it doesn't meet the conditions to match rule #1, then it matches rule #2 and will be blocked.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now ask the question, with this same policy, will "y.y.y.y" be blocked?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If x.x.x.x initiates a connection to y.y.y.y on udp/53, then it will match rule #1 and will not be blocked.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If x.x.x.x initiates a connection to y.y.y.y on tcp/80, then it does not match rule #1 and will be blocked.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Fri, 13 Apr 2018 21:09:00 GMT</pubDate>
    <dc:creator>jvalentine</dc:creator>
    <dc:date>2018-04-13T21:09:00Z</dc:date>
    <item>
      <title>specific blocked IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210039#M61361</link>
      <description>&lt;P&gt;Is there a way to search for one IP and all the places it might be blocked on the firewall?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Apr 2018 15:26:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210039#M61361</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-13T15:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: specific blocked IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210054#M61363</link>
      <description>&lt;P&gt;Assumning you're logging all of your traffic, the Unified Log Viewer might be able to address this particular request.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Monitor / Logs / Unified&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use this query:&lt;/P&gt;&lt;P&gt;&amp;nbsp; (addr in x.x.x.x) and (action neq alert) and (action neq allow)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The result of this query will show blocked traffic to/from that specific IP address, and whether it was blocked because of URL Filtering, File Blocking, Security Policy, Application Control, IPS, Anti-Virus, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This would only show you things that have actually been blocked in the past.&amp;nbsp; It will not show you things that &lt;EM&gt;might&lt;/EM&gt; be blocked in the future.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you're looking to "test" your security policy for some potential future event, take a look at the "test" commands available via the CLI.&amp;nbsp; For example, "test security-policy-match"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;admin@pa0-black_knight(active)&amp;gt; test security-policy-match&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;+ application Application name&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;+ category Category name&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;+ destination destination IP address&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;+ destination-port Destination port&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;+ from from&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;+ protocol IP protocol value&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;+ show-all show all potential match rules until first allow rule&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;+ source source IP address&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;+ source-user Source User&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;+ to to&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;| Pipe through a command&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;lt;Enter&amp;gt; Finish input&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;admin@pa0-black_knight(active)&amp;gt; test security-policy-match source 10.1.1.100 destination 4.2.2.1 protocol 17 destination-port 53 application dns&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;"deny outbound dns; index: 9" {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;from any;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;source any;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;source-region none;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;to untrust;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;destination any;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;destination-region none;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;user any;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;category any;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;application/service 0:dns/any/any/any;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;action deny;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;icmp-unreachable: no&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;terminal no;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;}&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;admin@pa0-black_knight(active)&amp;gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Apr 2018 15:51:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210054#M61363</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2018-04-13T15:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: specific blocked IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210055#M61364</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/22017"&gt;@jvalentine&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I should have qualified the question, find a rule that is going to block a certain IP&lt;/P&gt;</description>
      <pubDate>Fri, 13 Apr 2018 15:54:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210055#M61364</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-13T15:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: specific blocked IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210059#M61365</link>
      <description>&lt;P&gt;I would recommend using the "test security-policy-match" CLI command then.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Apr 2018 16:48:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210059#M61365</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2018-04-13T16:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: specific blocked IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210060#M61366</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/22017"&gt;@jvalentine&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know the source but it looks like i have to&amp;nbsp;enter a&amp;nbsp; destination as well and that would give what rule is blocking it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Apr 2018 16:58:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210060#M61366</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-13T16:58:01Z</dc:date>
    </item>
    <item>
      <title>Re: specific blocked IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210092#M61376</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Isn't that what you are looking for? Unless the source address is blocked on a 'Blacklist' of sorts that sits above all the rest of your security policies, the source itself doesn't really matter.&lt;/P&gt;&lt;P&gt;Say for example I wanted to see if a source address of 1.5.5.5 would be blocked by my current policies, on my network it would be due to it existing in an IP block in a research range and it being included on a 'Blacklist' which is the very first security policy I have. Now if I wanted to check 206.185.243.187, which isn't in my blacklist, then I would need to go through my entire rulebase and see if that address would be allowed. It might be denied from my SMTP servers, but be allowed to hit my webserver, but then be denied from hitting an SSH jumphost. There is noway to go through and say is 206.185.243.187 going to be allowed across my entire rulebase automatically.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you feel like an address is getting blocked for some reason, then using the unified logs as mentioned by&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/22017"&gt;@jvalentine&lt;/a&gt;&amp;nbsp;is your best bet to see what exactly happened to the traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Apr 2018 19:44:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210092#M61376</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-13T19:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: specific blocked IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210122#M61393</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I guess I would say I am trying to answer someones question - can you find the rule on the firewall that will block an IP address? Before you even try doing anything to or from that IP address&lt;/P&gt;</description>
      <pubDate>Fri, 13 Apr 2018 20:42:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210122#M61393</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-13T20:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: specific blocked IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210124#M61395</link>
      <description>&lt;DIV class="lia-quilt-row lia-quilt-row-forum-message-main"&gt;&lt;DIV class="lia-quilt-column lia-quilt-column-20 lia-quilt-column-right lia-quilt-column-main-right"&gt;&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-right"&gt;&lt;DIV class="lia-message-body lia-component-body"&gt;&lt;DIV class="lia-message-body-content"&gt;&lt;P&gt;"test security-policy-match" will find the rule on the firewall that will block a flow.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Of course, the firewall never sees "just" an IP address out of context.... it will also see source/destination IPs, source/destination ports, protocols, etc.&amp;nbsp; The "test security-policy-match" requires that information in order to determine whether or not it would block that flow.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Changing any one of those variables (src/dst address/port, protocol, app) will affect the firewall's decision to allow/deny.&amp;nbsp; For example, let's say you have only two firewall rules:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;rule1:&amp;nbsp; permit from x.x.x.x to "any ip" on udp/53&amp;nbsp;&lt;/P&gt;&lt;P&gt;rule2:&amp;nbsp; deny all traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your question is will "x.x.x.x" be blocked?&amp;nbsp; If it meets the additional conditions to match rule #1, then no, it won't be blocked.&amp;nbsp; If it doesn't meet the conditions to match rule #1, then it matches rule #2 and will be blocked.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now ask the question, with this same policy, will "y.y.y.y" be blocked?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If x.x.x.x initiates a connection to y.y.y.y on udp/53, then it will match rule #1 and will not be blocked.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If x.x.x.x initiates a connection to y.y.y.y on tcp/80, then it does not match rule #1 and will be blocked.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 13 Apr 2018 21:09:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210124#M61395</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2018-04-13T21:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: specific blocked IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210316#M61434</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/22017"&gt;@jvalentine&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Again this question is based on a situation with coworkers where they think that the PA should be able to tell you if any of the rules you have will block a specific IP address/server&lt;/P&gt;&lt;P&gt;So can you remove a server from a rule that allows the traffic from the internet in to the server (external to internal) and stil be able to go to an ubuntu update site and download updates to the server that has been removed from and internet incoming rule.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 13:09:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210316#M61434</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-16T13:09:07Z</dc:date>
    </item>
    <item>
      <title>Re: specific blocked IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210379#M61452</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;That would depend on why you were allowing traffic from the internet in to the server; if it was configured this way because the external host was&amp;nbsp;&lt;EM&gt;initiating&lt;/EM&gt; the traffic to the server then you would likely still need it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the server in question is the one initiating the traffic and the external server is simply replying, it'll match the session already allowed and the traffic will be allowed to pass.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 17:15:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210379#M61452</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-16T17:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: specific blocked IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210419#M61468</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;We are allowing it because it is a wordpress server hosting blogs. But as we all know wordpress servers are dirt magnets&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 19:45:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/specific-blocked-ip/m-p/210419#M61468</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-16T19:45:51Z</dc:date>
    </item>
  </channel>
</rss>

