<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Installing a pair of 850s and a pair of 3260s this weekend - interface speed in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/installing-a-pair-of-850s-and-a-pair-of-3260s-this-weekend/m-p/216845#M62771</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/88384"&gt;@campbech1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You could through the use of application override policies and simply disabling all profiles assigned to the appropriate security policies. The real question would be if the backups really need to happen at line speed or if you could still leave at least app-id enabled so you can verify that it's at least backup traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue with what you are proposing is that the application override policy stops app-id and then if you are disabling threat identification on this traffic you essentially say that anything from/to your backup server from/to your servers is perfectly fine. I would only&amp;nbsp;&lt;EM&gt;think&lt;/EM&gt; of doing this if your backup system is completely offline and managed through an offline computer. If that backup system becomes infected you are giving it a very easy path to spread throughout your environment.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Jun 2018 13:48:17 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2018-06-06T13:48:17Z</dc:date>
    <item>
      <title>Installing a pair of 850s and a pair of 3260s this weekend - interface speed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/installing-a-pair-of-850s-and-a-pair-of-3260s-this-weekend/m-p/216825#M62768</link>
      <description>&lt;P&gt;We have had some requirements change since ordering this equipment and may change direction on where these new firewalls get installed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Initially we ordered the 3260s for our hosted data center since most of the servers are located there and vendor provided backup solution is there. The concern was the amount of traffic that we would be pushing through the firewall during backup times. All of the server VLANs&amp;nbsp;are terminated on the firewalls. That direction is changing now. We are looking to move the servers back to our corporate location where we had planned on the 850s to be installed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A&amp;nbsp;long term direction was proposed today to bring these servers back in-house by the end of the year which changes where I potentially place these firewalls. I'm now looking at installing the 850s at the hosted data center and the 3260s at our corporate location (data center).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I able to write a policy to allow hosts to talk to other hosts through the firewall but to disable the APP-ID and threat prevention policies to allow traffic to flow at the 10G speeds? This would be related to backup traffic in particular.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance. This should be an interesting weekend installing these since I've been a Cisco engineer for the past 20 years.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jun 2018 12:52:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/installing-a-pair-of-850s-and-a-pair-of-3260s-this-weekend/m-p/216825#M62768</guid>
      <dc:creator>campbech1</dc:creator>
      <dc:date>2018-06-06T12:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: Installing a pair of 850s and a pair of 3260s this weekend - interface speed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/installing-a-pair-of-850s-and-a-pair-of-3260s-this-weekend/m-p/216845#M62771</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/88384"&gt;@campbech1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You could through the use of application override policies and simply disabling all profiles assigned to the appropriate security policies. The real question would be if the backups really need to happen at line speed or if you could still leave at least app-id enabled so you can verify that it's at least backup traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue with what you are proposing is that the application override policy stops app-id and then if you are disabling threat identification on this traffic you essentially say that anything from/to your backup server from/to your servers is perfectly fine. I would only&amp;nbsp;&lt;EM&gt;think&lt;/EM&gt; of doing this if your backup system is completely offline and managed through an offline computer. If that backup system becomes infected you are giving it a very easy path to spread throughout your environment.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jun 2018 13:48:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/installing-a-pair-of-850s-and-a-pair-of-3260s-this-weekend/m-p/216845#M62771</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-06-06T13:48:17Z</dc:date>
    </item>
  </channel>
</rss>

