<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Best way to allow ALL traffic for troubleshooting in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-allow-all-traffic-for-troubleshooting/m-p/213767#M62157</link>
    <description>&lt;P&gt;Hi people,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to troubleshoot a connectvity issue.... typical problem where server guy says "it's a firewall issue". Can anyone suggest what's the best way to allow all traffic? I was thinking of traffic from my source (10.0.0.0/8) to destination B10.1.0.0/8) but use&amp;nbsp;&lt;/P&gt;&lt;P&gt;Application: ANY&lt;/P&gt;&lt;P&gt;Service: ANY&lt;/P&gt;&lt;P&gt;log both start and stop&lt;/P&gt;&lt;P&gt;turn off virus checking,&amp;nbsp;&lt;/P&gt;&lt;P&gt;turn off anti spoofing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to avoid any issues with application ports and service types. Is service any, application any the best way to make the policy to allow all traffic? Or should i consider specifying application unknown-tcp and unknown-udp with service any or application default?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions would help. thank you. D&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 09 May 2018 16:49:03 GMT</pubDate>
    <dc:creator>Jedi_D</dc:creator>
    <dc:date>2018-05-09T16:49:03Z</dc:date>
    <item>
      <title>Best way to allow ALL traffic for troubleshooting</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-allow-all-traffic-for-troubleshooting/m-p/213767#M62157</link>
      <description>&lt;P&gt;Hi people,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to troubleshoot a connectvity issue.... typical problem where server guy says "it's a firewall issue". Can anyone suggest what's the best way to allow all traffic? I was thinking of traffic from my source (10.0.0.0/8) to destination B10.1.0.0/8) but use&amp;nbsp;&lt;/P&gt;&lt;P&gt;Application: ANY&lt;/P&gt;&lt;P&gt;Service: ANY&lt;/P&gt;&lt;P&gt;log both start and stop&lt;/P&gt;&lt;P&gt;turn off virus checking,&amp;nbsp;&lt;/P&gt;&lt;P&gt;turn off anti spoofing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to avoid any issues with application ports and service types. Is service any, application any the best way to make the policy to allow all traffic? Or should i consider specifying application unknown-tcp and unknown-udp with service any or application default?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions would help. thank you. D&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 16:49:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-allow-all-traffic-for-troubleshooting/m-p/213767#M62157</guid>
      <dc:creator>Jedi_D</dc:creator>
      <dc:date>2018-05-09T16:49:03Z</dc:date>
    </item>
    <item>
      <title>Re: Best way to allow ALL traffic for troubleshooting</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-allow-all-traffic-for-troubleshooting/m-p/213778#M62158</link>
      <description>&lt;P&gt;application unknown-tcp and unknown-udp will block all KNOWN applications&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;app any/service any would be best IMO - make sure the rule is universal to truly allow ANY traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The logs will show you what applications and ports are actually in use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;alternately, override the default allow and deny rules to add logging, and you will see if there is any traffic being allowed or denied silently without opening the firewall to all traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 17:25:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-allow-all-traffic-for-troubleshooting/m-p/213778#M62158</guid>
      <dc:creator>JoeAndreini</dc:creator>
      <dc:date>2018-05-09T17:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: Best way to allow ALL traffic for troubleshooting</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-allow-all-traffic-for-troubleshooting/m-p/213793#M62164</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/52883"&gt;@Jedi_D&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I would generally do exactly what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83021"&gt;@JoeAndreini&lt;/a&gt;&amp;nbsp;mentioned at the end of his post. Simply override the logging on the intra/inter zone rules and see what the logs have to say. This way you aren't opening up anything for testing purposes but you can still see what the traffic looks like.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a side note also ensure that you are looking in the unified logs and not just the traffic logs. Traffic may be allowed, however a threat is being identified that causes the firewall to close the session.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 19:43:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-way-to-allow-all-traffic-for-troubleshooting/m-p/213793#M62164</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-05-09T19:43:35Z</dc:date>
    </item>
  </channel>
</rss>

