<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Confused about zones in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/confused-about-zones/m-p/218615#M63183</link>
    <description>&lt;P&gt;If you are using built-in intra-zone rule, then traffic will be allowed by default. I have seen admins placing 'Deny All' rule above the built-in intra-zone rule which will block the traffic unless you have specific trust-trust, DMZ-DMZ intrazone rule on top.&lt;/P&gt;</description>
    <pubDate>Wed, 20 Jun 2018 19:35:08 GMT</pubDate>
    <dc:creator>anuj_mor</dc:creator>
    <dc:date>2018-06-20T19:35:08Z</dc:date>
    <item>
      <title>Confused about zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/confused-about-zones/m-p/218551#M63166</link>
      <description>&lt;P&gt;I'm currently migrating from a pair of Cisco ASAs and the zones have me a little confused.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Right now I have interfaces on the ASAs of inside, wireless, outside, dmz-private-web, dmz-private-db, dmz-public-web, dmz-public-db, dmz-dev-web, dmz-dev-db.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My plan was to group the inside and wireless together as "trusted", outside as "outside, and then all of the DMZ zones as "DMZ".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the interfaces are placed into a single zone like that, hopefully rules are still required between them?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jun 2018 15:32:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/confused-about-zones/m-p/218551#M63166</guid>
      <dc:creator>campbech1</dc:creator>
      <dc:date>2018-06-20T15:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/confused-about-zones/m-p/218578#M63169</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/88384"&gt;@campbech1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;By default anything that you place in the same 'zone' is trusted and will be allowed. However this policy can be changed so that you deny intra-zone traffic by default and do exactly what you want here.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jun 2018 17:14:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/confused-about-zones/m-p/218578#M63169</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-06-20T17:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/confused-about-zones/m-p/218615#M63183</link>
      <description>&lt;P&gt;If you are using built-in intra-zone rule, then traffic will be allowed by default. I have seen admins placing 'Deny All' rule above the built-in intra-zone rule which will block the traffic unless you have specific trust-trust, DMZ-DMZ intrazone rule on top.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jun 2018 19:35:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/confused-about-zones/m-p/218615#M63183</guid>
      <dc:creator>anuj_mor</dc:creator>
      <dc:date>2018-06-20T19:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/confused-about-zones/m-p/219859#M63444</link>
      <description>&lt;P&gt;The firewall needs to be the DG for each of the subnets in the DMZ for intra-zone firewalling to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 08:01:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/confused-about-zones/m-p/219859#M63444</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2018-06-29T08:01:16Z</dc:date>
    </item>
    <item>
      <title>Re: Confused about zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/confused-about-zones/m-p/219956#M63472</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;This can also be acheived by using the address's and subnets. We took a DMZ and carved out int little /29's. We also have a DENY ALL rule above the built in intra-zone rule. We then control what can enter and/or leave the zone. Also the PAN was the DG of the subnet so all traffic had to flow through it so it could apply policices. However if you have say a virtual host with many VM's on it and they are in the same subnet and zone. They would still be able to talk to each other, hence why we carved out /29's.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this makes sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good luck!&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jun 2018 16:49:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/confused-about-zones/m-p/219956#M63472</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-06-29T16:49:41Z</dc:date>
    </item>
  </channel>
</rss>

