<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security Policy Granular to Address Group? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-granular-to-address-group/m-p/239437#M68567</link>
    <description>&lt;P&gt;I have a group of computers that I want to apply a different security policy with a different Security Profile to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have created 2 Security policies.&lt;/P&gt;&lt;P&gt;The first policy = Internet Out allow any -&amp;nbsp; Trusted Zone to Untrusted Zone with the default 'basic file blocking' &lt;EM&gt;Security profile&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;The second policy = Internet Out allow any&amp;nbsp; - Trusted Zone with Source Address = Test_Group (specific group of computers) and a 'special file blocking' &lt;EM&gt;Security profile.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The policies don't seem to granulary apply. Meaning, the Top policy always applies to ALL Outgoing computers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recently added a Negate Source in the first policy to see if it would allow the 'special group' of computers to pass over the first policy and have the second policy apply to them.&amp;nbsp; This may have resolved my desired policy application results?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If not - what could I be missing?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 11 Nov 2018 22:54:52 GMT</pubDate>
    <dc:creator>catrock</dc:creator>
    <dc:date>2018-11-11T22:54:52Z</dc:date>
    <item>
      <title>Security Policy Granular to Address Group?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-granular-to-address-group/m-p/239437#M68567</link>
      <description>&lt;P&gt;I have a group of computers that I want to apply a different security policy with a different Security Profile to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have created 2 Security policies.&lt;/P&gt;&lt;P&gt;The first policy = Internet Out allow any -&amp;nbsp; Trusted Zone to Untrusted Zone with the default 'basic file blocking' &lt;EM&gt;Security profile&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;The second policy = Internet Out allow any&amp;nbsp; - Trusted Zone with Source Address = Test_Group (specific group of computers) and a 'special file blocking' &lt;EM&gt;Security profile.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The policies don't seem to granulary apply. Meaning, the Top policy always applies to ALL Outgoing computers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recently added a Negate Source in the first policy to see if it would allow the 'special group' of computers to pass over the first policy and have the second policy apply to them.&amp;nbsp; This may have resolved my desired policy application results?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If not - what could I be missing?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Nov 2018 22:54:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-granular-to-address-group/m-p/239437#M68567</guid>
      <dc:creator>catrock</dc:creator>
      <dc:date>2018-11-11T22:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Granular to Address Group?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-granular-to-address-group/m-p/239445#M68568</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/98907"&gt;@catrock&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The firewall always evaluates the policies top&amp;gt;down. So you need to place the more granular rule (the one with the specific source addresses) above the rule with the general access for your trust zone.&lt;/P&gt;</description>
      <pubDate>Sun, 11 Nov 2018 23:32:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-granular-to-address-group/m-p/239445#M68568</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-11-11T23:32:17Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Granular to Address Group?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-granular-to-address-group/m-p/240327#M68872</link>
      <description>&lt;P&gt;Thank you &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My policy's are as such in the attached image.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="catPturepl67.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17579i623A6E8B5450CDDD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="catPturepl67.JPG" alt="catPturepl67.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Should work as desired - yes?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 14:38:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-granular-to-address-group/m-p/240327#M68872</guid>
      <dc:creator>catrock</dc:creator>
      <dc:date>2018-11-19T14:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Granular to Address Group?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-granular-to-address-group/m-p/240861#M68987</link>
      <description>&lt;P&gt;Yes, that seems to be correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the less strict address object?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And what does the session logs show for the unexpectedly permitted traffic in the details?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 14:26:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-granular-to-address-group/m-p/240861#M68987</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2018-11-22T14:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Granular to Address Group?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-granular-to-address-group/m-p/242509#M69367</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;The Less_Strict_Object is a member of a Less_Strict_addy_grp that will be used to allow different secuity Profle group settings.&lt;/P&gt;&lt;P&gt;There is only 1 computer in this group - it is define by a single IP.&amp;nbsp; I did have the IP address (defined in the object) 'ip netmask using a CIDR (192.168.0.23/24).&amp;nbsp; I have removed the /24 from it to test further (192.168.0.23)&lt;/P&gt;&lt;P&gt;Specifically, I am trying to use it to allow my mac to download VMWare fusion updates that are TAR/other that I don't want other computers to be able to download.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BTW: the policy order still doesn't seem to be working properly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Dec 2018 14:39:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-granular-to-address-group/m-p/242509#M69367</guid>
      <dc:creator>catrock</dc:creator>
      <dc:date>2018-12-07T14:39:14Z</dc:date>
    </item>
  </channel>
</rss>

