<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Policy Application in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251332#M71465</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80691"&gt;@GCSS-RT&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you have granularity only in IP range, rest set to any/default, all your traffic from those IP travelling through matched zones will hit same policy regardless of user.&lt;/P&gt;</description>
    <pubDate>Tue, 26 Feb 2019 13:00:44 GMT</pubDate>
    <dc:creator>Abdul_Razaq</dc:creator>
    <dc:date>2019-02-26T13:00:44Z</dc:date>
    <item>
      <title>Security Policy Application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251217#M71438</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I'm hoping someone can help me understand why a security policy is not applying the way I thought it should. Here's what I have:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have each of our schools configured on different DHCP scopes. I then created an Address Object using slash notation for each of those DHCP scopes on the PAN. I then created a security policy per address object (per school building) and added the slash-notated address object as the source address.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The question I have is this...shouldn't this security policy apply to EVERY device that grabs an IP address from within the slash-notated network I created and designated as the source address in the security policy no matter if there is a username associated to the device or not?&lt;/P&gt;</description>
      <pubDate>Mon, 25 Feb 2019 20:33:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251217#M71438</guid>
      <dc:creator>GCSS-RT</dc:creator>
      <dc:date>2019-02-25T20:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251265#M71444</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80691"&gt;@GCSS-RT&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You'd have to actually post the policy to see what the exact issue is. If you utilize 10.10.0.0/16 for example as a source-address that part of the policy will match 10.10.*.*, however depending on the rest of your policy it doesn't mean that every session would match this policy.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 01:58:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251265#M71444</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-02-26T01:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251304#M71456</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80691"&gt;@GCSS-RT&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;like&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp; mentioned, it depends on your policy, as all the column other than action in the security is AND condition, if everything matches only, the security rule will be applied. if your rule is not user based(ie user any), it will hit this policy provided all other AND conditions are also mathed.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 07:11:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251304#M71456</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-02-26T07:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251331#M71464</link>
      <description>&lt;P&gt;I think I'm following what you guys are saying. The only settings I have in the policy are as follows:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source Tab:&lt;/P&gt;&lt;P&gt;trust source zone&lt;/P&gt;&lt;P&gt;IP range as source address&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Destination Tab:&lt;/P&gt;&lt;P&gt;untrust destination zone&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actions Tab:&lt;/P&gt;&lt;P&gt;Allow action&lt;/P&gt;&lt;P&gt;appropriate profiles applied under the Profile Settings section&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;everything else is set to "any" or the default setting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this info help?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 12:49:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251331#M71464</guid>
      <dc:creator>GCSS-RT</dc:creator>
      <dc:date>2019-02-26T12:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251332#M71465</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80691"&gt;@GCSS-RT&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you have granularity only in IP range, rest set to any/default, all your traffic from those IP travelling through matched zones will hit same policy regardless of user.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 13:00:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251332#M71465</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-02-26T13:00:44Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251333#M71466</link>
      <description>&lt;P&gt;Reset the zone settings to any/default?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 12:58:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251333#M71466</guid>
      <dc:creator>GCSS-RT</dc:creator>
      <dc:date>2019-02-26T12:58:18Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251334#M71467</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80691"&gt;@GCSS-RT&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it is queries, are you facing any issue?,&lt;/P&gt;&lt;P&gt;The packet flow in PA will be like,&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;initial packet process, the source ip/user info, then destination zone via PBF/forwarding,&lt;/LI&gt;&lt;LI&gt;Then NAT policy evaluated (not applied)&lt;/LI&gt;&lt;LI&gt;then it checks for security policy&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So you need to have source and destination zones anyway.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 13:04:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251334#M71467</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-02-26T13:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251354#M71478</link>
      <description>&lt;P&gt;Hold the boat there&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/101029"&gt;@Abdul_Razaq&lt;/a&gt;; I wouldn't recommend someone setup a policy that is just going to allow any traffic even for testing purposes as that runs the risk of having very big implications on the rest of their policy base depending on how their firewall is configured.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80691"&gt;@GCSS-RT&lt;/a&gt;&amp;nbsp;can you share the actual screenshot, cli output, or XML of the entry that you are having a problem with? If the policy is as you stated I would expect any traffic from your source IP Range to the untrust zone to be allowed per this policy. You'd also want to verify that the traffic you expect to be hitting this rule is being sourced from the trust zone and is actually destined to your untrust zone.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 14:00:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251354#M71478</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-02-26T14:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251364#M71480</link>
      <description>&lt;P&gt;Here's the CLI output for this security policy. Let me know what else I can supply that might help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set rulebase security rules "EES Network" from trust&lt;BR /&gt;set rulebase security rules "EES Network" to untrust&lt;BR /&gt;set rulebase security rules "EES Network" source Network_EES&lt;BR /&gt;set rulebase security rules "EES Network" destination any&lt;BR /&gt;set rulebase security rules "EES Network" service any&lt;BR /&gt;set rulebase security rules "EES Network" application any&lt;BR /&gt;set rulebase security rules "EES Network" action allow&lt;BR /&gt;set rulebase security rules "EES Network" log-end yes&lt;BR /&gt;set rulebase security rules "EES Network" source-user any&lt;BR /&gt;set rulebase security rules "EES Network" category any&lt;BR /&gt;set rulebase security rules "EES Network" hip-profiles any&lt;BR /&gt;set rulebase security rules "EES Network" disabled no&lt;BR /&gt;set rulebase security rules "EES Network" log-start yes&lt;BR /&gt;set rulebase security rules "EES Network" profile-setting profiles url-filtering EESNetwork-Filtering-Profile&lt;BR /&gt;set rulebase security rules "EES Network" profile-setting profiles virus ANTIVIRUS&lt;BR /&gt;set rulebase security rules "EES Network" profile-setting profiles spyware SPYWARE&lt;BR /&gt;set rulebase security rules "EES Network" profile-setting profiles vulnerability VULNERABILITY&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 14:44:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251364#M71480</guid>
      <dc:creator>GCSS-RT</dc:creator>
      <dc:date>2019-02-26T14:44:18Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251365#M71481</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80691"&gt;@GCSS-RT&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;So I would fully expect that the capture any traffic from trust to untrust for anything within that Network_ESS object entry with how you've configured the security policy. If it isn't here's what I would look at:&lt;/P&gt;&lt;P&gt;1) Does the address object 'Network_EES' actually match what you are expecting. Sometimes you'll believe that the address object should be 192.168.0.0/16 and the person who entered it may have fat fingered the IP address.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Looking at the logs that don't hit this security policy, verify that the zones listed are what you expect and the traffic isn't taking an unexpected route.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 14:49:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251365#M71481</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-02-26T14:49:06Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251367#M71483</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80691"&gt;@GCSS-RT&lt;/a&gt;&amp;nbsp;And check in the unified log, if the connections are dropped by one of your Security profiles&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 14:53:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-application/m-p/251367#M71483</guid>
      <dc:creator>Chacko42</dc:creator>
      <dc:date>2019-02-26T14:53:25Z</dc:date>
    </item>
  </channel>
</rss>

