<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Interface Management profile with public IPs? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/interface-management-profile-with-public-ips/m-p/249026#M70844</link>
    <description>&lt;P&gt;Thank y'all for the feedback!!&lt;/P&gt;</description>
    <pubDate>Wed, 06 Feb 2019 14:56:01 GMT</pubDate>
    <dc:creator>OMatlock</dc:creator>
    <dc:date>2019-02-06T14:56:01Z</dc:date>
    <item>
      <title>Interface Management profile with public IPs?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-management-profile-with-public-ips/m-p/248927#M70816</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a PA200 that is in a remote branch location.&amp;nbsp; It's connected via IPSec tunnel for management purposes.&lt;/P&gt;&lt;P&gt;After we had to switch it out last year because of a recall, I found it useful to create an interface management profile with our specific HQ public IPs access to it, in order to login to it when the IPSec tunnel was not available (or in case it was not available for whatever reason).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In general:&amp;nbsp; Is it a good idea (or not), or common to maintain an interface management profile assigned to public interface with specific public IPs access only, as a backup connection option?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 19:30:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-management-profile-with-public-ips/m-p/248927#M70816</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2019-02-05T19:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Management profile with public IPs?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-management-profile-with-public-ips/m-p/248974#M70824</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56398"&gt;@OMatlock&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So this is where you kind of have to look at the risk vs reward aspect of things and see if it makes sense for your company. You're exposing management access from a public interface, and while you limited it via &amp;lt;permitted-ip&amp;gt; entries there is always the possibility that a bug in PAN-OS eventually gets discovered that allows someone to bypass that. That being said, it would still require that they actually be able to log into the device.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for your question specifically, I feel like you've taken reasonable steps to secure device access while allowing a backup management method. I myself have many remote PA-200/PA-220s configured exactly like this for less sensitive environments. That being said, for remote health clinics or branch bank offices, I absolutely wouldn't expose the management services on a publically available interface even when using permitted IP entries. The risk of doing so simply wouldn't be worth avoiding an on-site visit.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Like I said, this depends on your particular companies risk assessment. For the majority of businesses, I would say you are doing things the best way you can while still being able to manage the device remotely if the tunnel goes down. If you work in a more risk-averse industry, it might not be worth it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 03:38:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-management-profile-with-public-ips/m-p/248974#M70824</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-02-06T03:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Management profile with public IPs?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-management-profile-with-public-ips/m-p/249001#M70837</link>
      <description>&lt;P&gt;I really liked your comment &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only think I could add is to configure two additional intrazone rules.&lt;/P&gt;&lt;P&gt;One to allow only specific public addresses to connect to the firewall public IP address&lt;/P&gt;&lt;P&gt;Second to deny any source to reach the firewall public IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On first look it doesn't make much sense, since the &amp;lt;permitted-ip&amp;gt; is doing the exact samething, but for the reason that you pointed out - you never knew when, a OS bug will be found to bypass the &amp;lt;permitted-ip&amp;gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 12:12:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-management-profile-with-public-ips/m-p/249001#M70837</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2019-02-06T12:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Management profile with public IPs?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-management-profile-with-public-ips/m-p/249026#M70844</link>
      <description>&lt;P&gt;Thank y'all for the feedback!!&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 14:56:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-management-profile-with-public-ips/m-p/249026#M70844</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2019-02-06T14:56:01Z</dc:date>
    </item>
  </channel>
</rss>

