<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Untrust to Untrust - Allow in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228634#M65727</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt;&amp;nbsp;lol funny, I know the feeling&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;This is what I thought. I would delete that untrust - untrust rule, and create say a VPN Rule, select source zone untrust, destination untrust (+ ip address) with applications IKE, IPSec, etc.&amp;nbsp; You agree?&lt;/P&gt;</description>
    <pubDate>Tue, 28 Aug 2018 20:51:35 GMT</pubDate>
    <dc:creator>ce1028</dc:creator>
    <dc:date>2018-08-28T20:51:35Z</dc:date>
    <item>
      <title>Untrust to Untrust - Allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228308#M65655</link>
      <description>&lt;P&gt;I was working at a customer site and noticed the customer's last rule before their "Catch-All - Deny" rule was&amp;nbsp;&amp;nbsp;"Untrust - Untrust Allow". It was a universal rule with source zone untrust&amp;nbsp; destination zone untrust set to allow.&amp;nbsp;When I asked why they had this rule, the response was "By default, &amp;nbsp;the firewall comes with a default intrazone allow rule, which is the same thing"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I personally would never set up this rule. Since they were using VPNs, I suggested replacing that with a VPN rule untrust -&amp;gt; untrust, allowing applications for ike, ipsec and gp.&amp;nbsp;&amp;nbsp;In the end, they declined.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just wondering your opinions on this?&lt;/P&gt;</description>
      <pubDate>Sun, 26 Aug 2018 19:00:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228308#M65655</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2018-08-26T19:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: Untrust to Untrust - Allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228336#M65661</link>
      <description>&lt;P&gt;I always make 'default drop' rule which drops everything to override intrazone rule.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Aug 2018 05:56:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228336#M65661</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2018-08-27T05:56:20Z</dc:date>
    </item>
    <item>
      <title>Re: Untrust to Untrust - Allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228337#M65662</link>
      <description>&lt;P&gt;by default there is indeed an intrazone allow all policy which will only allow session inside the same zone&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;there's 2 common uses for this policy (with the second one not being my favorite, but it's there as an FYI)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;first, you will allow connections to the firewall interface, which won't do anything and get dropped anyway if a service is not attached to a socket (but it facilitates VPNs&amp;nbsp;and management connections if you did enable a management profile)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;second: if you added multiple interfaces to the same zone, or you're somehow bouncing connections off of the interface because you neglected to inform a host of a downstream router, these packets will be allowed to pass through.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for the former I'd VERY MUCH prefer to see specific security policies apply security profiles (scanning) to the connections and the latter will cause problems anyway because the return packets from the destination behind the downstream router will be returned to the original host directly causing the firewall to have half-open sessions and eventually blocking the packets anyway (you need U-TURN NAT to fix this btw)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Aug 2018 06:38:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228337#M65662</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-08-27T06:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: Untrust to Untrust - Allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228404#M65672</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;by default there is indeed an intrazone allow all policy which will only allow session inside the same zone&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;there's 2 common uses for this policy (with the second one not being my favorite, but it's there as an FYI)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;first, you will allow connections to the firewall interface, which won't do anything and get dropped anyway if a service is not attached to a socket (but it facilitates VPNs&amp;nbsp;and management connections if you did enable a management profile)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;second: if you added multiple interfaces to the same zone, or you're somehow bouncing connections off of the interface because you neglected to inform a host of a downstream router, these packets will be allowed to pass through.&amp;nbsp;&lt;/P&gt;&lt;P&gt;for the former I'd VERY MUCH prefer to see specific security policies apply security profiles (scanning) to the connections and the latter will cause problems anyway because the return packets from the destination behind the downstream router will be returned to the original host directly causing the firewall to have half-open sessions and eventually blocking the packets anyway (you need U-TURN NAT to fix this btw)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply. If the external interface is only needed for VPN and Management Profile, are you saying, it's fine having untrust -&amp;gt; untrust allow,&amp;nbsp; or would you create more specific rules?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sounds like you're saying since the firewall will drop the connection if a service isn't attached, it's not a problem to have this allow any application/server from untrust to untrust rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just doesn't seem right to me, but I'm open to opinions&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Aug 2018 15:49:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228404#M65672</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2018-08-27T15:49:25Z</dc:date>
    </item>
    <item>
      <title>Re: Untrust to Untrust - Allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228481#M65681</link>
      <description>&lt;P&gt;You would also allow all traffic to your servers visible from internet if you have some DNAT rules to inside (instead of DMZ). Let's say you make NAT rule for Exchange; if you NAT all services the rule you mentioned&amp;nbsp; will allow all traffic from internet to your server, smtp, https, rdp... Which is not something you want.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So make rules very specific, deny everything first then allow only what is needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 05:54:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228481#M65681</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2018-08-28T05:54:36Z</dc:date>
    </item>
    <item>
      <title>Re: Untrust to Untrust - Allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228504#M65686</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;You would also allow all traffic to your servers visible from internet if you have some DNAT rules to inside (instead of DMZ). Let's say you make NAT rule for Exchange; if you NAT all services the rule you mentioned&amp;nbsp; will allow all traffic from internet to your server, smtp, https, rdp... Which is not something you want.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So make rules very specific, deny everything first then allow only what is needed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;no, your security policy zones are &lt;STRONG&gt;post&lt;/STRONG&gt;-nat (while the destination IP is pre-nat) so to reach your&amp;nbsp;servers you need to have a policy from untrust to dmz.&lt;/P&gt;
&lt;P&gt;Untrust to untrust will not allow this&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 08:55:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228504#M65686</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-08-28T08:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: Untrust to Untrust - Allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228507#M65687</link>
      <description>&lt;P&gt;Somehow I was sure I read Untrust&amp;gt;Trust in his post. Sorry. Was before first morning coffee...&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 08:58:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228507#M65687</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2018-08-28T08:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: Untrust to Untrust - Allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228510#M65688</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71649"&gt;@ce1028&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
blablabla&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the reply. If the external interface is only needed for VPN and Management Profile, are you saying, it's fine having untrust -&amp;gt; untrust allow,&amp;nbsp; or would you create more specific rules?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sounds like you're saying since the firewall will drop the connection if a service isn't attached, it's not a problem to have this allow any application/server from untrust to untrust rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just doesn't seem right to me, but I'm open to opinions&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I Would still create more specific rules if possible. These rules are in place for convenience so you can set up your environment and give your attention to the most pressing matters first, then once you have your operational configuration in place you can narrow down your rules to the most optimal security stance for your environment.&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/documentation/best-practices&amp;nbsp;" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/best-practices&amp;nbsp;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 09:20:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228510#M65688</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-08-28T09:20:03Z</dc:date>
    </item>
    <item>
      <title>Re: Untrust to Untrust - Allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228634#M65727</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt;&amp;nbsp;lol funny, I know the feeling&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;This is what I thought. I would delete that untrust - untrust rule, and create say a VPN Rule, select source zone untrust, destination untrust (+ ip address) with applications IKE, IPSec, etc.&amp;nbsp; You agree?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Aug 2018 20:51:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228634#M65727</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2018-08-28T20:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: Untrust to Untrust - Allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228682#M65744</link>
      <description>&lt;P&gt;well their untrust untrust allow does not do anything in it's own as the default policy would already do what it does (allow intrazone&amp;nbsp;traffic)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you could certainly rebuild that policy&amp;nbsp;to only allow the applications you want, like ike and ipsec, and then set the default rule to drop instead of allow, or create a deny all rule for untrust at the end&lt;/P&gt;</description>
      <pubDate>Wed, 29 Aug 2018 06:45:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228682#M65744</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-08-29T06:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: Untrust to Untrust - Allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228725#M65749</link>
      <description>&lt;P&gt;My guess would be they wanted a logging profile on the default rules and did not know how to override them...&lt;/P&gt;</description>
      <pubDate>Wed, 29 Aug 2018 11:21:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/228725#M65749</guid>
      <dc:creator>JoeAndreini</dc:creator>
      <dc:date>2018-08-29T11:21:34Z</dc:date>
    </item>
    <item>
      <title>Re: Untrust to Untrust - Allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/229081#M65857</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;well their untrust untrust allow does not do anything in it's own as the default policy would already do what it does (allow intrazone&amp;nbsp;traffic)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you could certainly rebuild that policy&amp;nbsp;to only allow the applications you want, like ike and ipsec, and then set the default rule to drop instead of allow, or create a deny all rule for untrust at the end&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The default rules don't do anything in this case because there is an explicit deny&amp;nbsp;any&amp;nbsp;rule above them.&amp;nbsp; The untrust -&amp;gt; untrust rule is above the deny all rule&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 22:47:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/untrust-to-untrust-allow/m-p/229081#M65857</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2018-08-31T22:47:38Z</dc:date>
    </item>
  </channel>
</rss>

