<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto - Dynamic Updates in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dynamic-updates/m-p/257994#M73195</link>
    <description>&lt;P&gt;check out the link under '&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/networking/service-routes#" target="_self"&gt;service route&lt;/A&gt;' &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the service route grabs a specific service and pushes it down the backplane to the dataplane, there it is sent out the interface it is set to, following the routing table on the dataplane&lt;/P&gt;
&lt;P&gt;ie. -if the service route is connected to the external interface, connections will go directly to the default gateway onto the internet&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;-if the service route is connected on the LAN interface, the session will look for the appropriate route, go through the firewall and will be fully inspected before egressing out to the internet (this is the preferred method)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This can be configured for each individual (dns, ntp, updates, wildfire, software, ...) service the management plane needs, so only the ones you truly need will go out onto the internet&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 18 Apr 2019 12:11:46 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2019-04-18T12:11:46Z</dc:date>
    <item>
      <title>Palo Alto - Dynamic Updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dynamic-updates/m-p/257970#M73185</link>
      <description>&lt;P&gt;Hi I'm new to Palo Alto alto. but my company have several diffrent versions of Palo alto firewalls, some with direct support via palo alto PA-3050 where i have access to download the Dynaic updates directly. Plus some that we have support through a reseller that they need to download the updates and send to us as the firewalls don't have access to the internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wanted to know if the Anitirus and threat protection uptades that i can download from PA directly registerd against the PA-3050 can be used on a PA-820 and a PA-220 or do i have to get the reseller to download then and pass them to me every time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 10:34:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dynamic-updates/m-p/257970#M73185</guid>
      <dc:creator>kev91234</dc:creator>
      <dc:date>2019-04-18T10:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto - Dynamic Updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dynamic-updates/m-p/257977#M73186</link>
      <description>&lt;P&gt;Are the devices that have no internet set up like that intentionally (for security), as _all_ devices (with a valid license) are able to download updates directly from us&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the management interface needs to be OOB for security reasons, but there are dataplane interfaces connected to the internet, you can set up &lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/networking/service-routes#" target="_blank" rel="noopener"&gt;service routes&lt;/A&gt; so they are able to download updates without the mgmt interface needing to be connected&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That said, the installer packages are identical among all firewall models, so you only need to download them once and can be installed on all firewalls with one limmitation: the licenses need to match the package&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 11:12:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dynamic-updates/m-p/257977#M73186</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-04-18T11:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto - Dynamic Updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dynamic-updates/m-p/257984#M73192</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Are the devices that have no internet set up like that intentionally (for security), as _all_ devices (with a valid license) are able to download updates directly from us&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the management interface needs to be OOB for security reasons, but there are dataplane interfaces connected to the internet, you can set up &lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/networking/service-routes#" target="_blank" rel="noopener"&gt;service routes&lt;/A&gt; so they are able to download updates without the mgmt interface needing to be connected&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That said, the installer packages are identical among all firewall models, so you only need to download them once and can be installed on all firewalls with one limmitation: the licenses need to match the package&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;&amp;nbsp; thank you that is a great help yes we have the management OOB, i was wondering if We were to allow the updates for Anitvirus and and Application and threats . How would i go about creating rules to protect access through that service route. Or is&amp;nbsp;the fact of creating the service group only allow traffic from the firewall out to palo alto networks only for the updates and all other traffic is dropped.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 11:45:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dynamic-updates/m-p/257984#M73192</guid>
      <dc:creator>kev91234</dc:creator>
      <dc:date>2019-04-18T11:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto - Dynamic Updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dynamic-updates/m-p/257994#M73195</link>
      <description>&lt;P&gt;check out the link under '&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/networking/service-routes#" target="_self"&gt;service route&lt;/A&gt;' &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the service route grabs a specific service and pushes it down the backplane to the dataplane, there it is sent out the interface it is set to, following the routing table on the dataplane&lt;/P&gt;
&lt;P&gt;ie. -if the service route is connected to the external interface, connections will go directly to the default gateway onto the internet&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;-if the service route is connected on the LAN interface, the session will look for the appropriate route, go through the firewall and will be fully inspected before egressing out to the internet (this is the preferred method)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This can be configured for each individual (dns, ntp, updates, wildfire, software, ...) service the management plane needs, so only the ones you truly need will go out onto the internet&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 12:11:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dynamic-updates/m-p/257994#M73195</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-04-18T12:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto - Dynamic Updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dynamic-updates/m-p/258008#M73200</link>
      <description>&lt;P&gt;Alternative solution,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Purchase Panorama and push everything from it.&amp;nbsp; This way your firewalls don't need any internet connection what-so-ever.&amp;nbsp; You can automate all updates centrally from Panorama.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2019 14:38:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dynamic-updates/m-p/258008#M73200</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-04-18T14:38:14Z</dc:date>
    </item>
  </channel>
</rss>

