<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EDL in vsys environment in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/298379#M78195</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Also try to stay away from IP's unless you know they are super bad. This will reduce the number in your EDL hopefully. For inbound traffic, try a whitelist or blacklist to sites you are hosting and do it by country, do you really need some countries connecting in? For outbound traffic utilize the URL filtering as well as the DNS sinkhole feature. PAN also has a new secure DNS feature or you can use other ones to help in filtering out known bad places.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Wed, 13 Nov 2019 23:02:46 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2019-11-13T23:02:46Z</dc:date>
    <item>
      <title>EDL in vsys environment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/298320#M78190</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a pair of 5250 running PANOS 8.1 with 125 vsys.&amp;nbsp; We want to deploy EDL to block well known attackers.&amp;nbsp; My understand is the EDL has a limit of 150000 entries for IP list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I create a shared EDL (type IP list) with 10 entieres and create 2 panorama shared security rules for inbound and outbound for all 125 vsys.&amp;nbsp; Is that count as 1250 entries or 10 entries?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;E&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2019 19:09:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/298320#M78190</guid>
      <dc:creator>nextgenhappines</dc:creator>
      <dc:date>2019-11-13T19:09:07Z</dc:date>
    </item>
    <item>
      <title>Re: EDL in vsys environment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/298327#M78191</link>
      <description>&lt;P&gt;Hello there&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe your 150,000 limit is total across the appliance itself, regardless of vsys.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so your 10 entries x 125 vsys = 1250 of the total 150,000.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2019 19:29:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/298327#M78191</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-11-13T19:29:37Z</dc:date>
    </item>
    <item>
      <title>Re: EDL in vsys environment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/298379#M78195</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Also try to stay away from IP's unless you know they are super bad. This will reduce the number in your EDL hopefully. For inbound traffic, try a whitelist or blacklist to sites you are hosting and do it by country, do you really need some countries connecting in? For outbound traffic utilize the URL filtering as well as the DNS sinkhole feature. PAN also has a new secure DNS feature or you can use other ones to help in filtering out known bad places.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2019 23:02:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/298379#M78195</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-11-13T23:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: EDL in vsys environment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/298608#M78228</link>
      <description>&lt;P&gt;I agree with your points.&amp;nbsp; &amp;nbsp;The logic is to use well known blacklisted IPs and create EDL to load to the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;E&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 16:59:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/298608#M78228</guid>
      <dc:creator>nextgenhappines</dc:creator>
      <dc:date>2019-11-14T16:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: EDL in vsys environment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/298609#M78229</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I agree with you. Palo Alto has built in ones you can use. Here is also a list of ones I use. However I rarely get hits on these policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source on PAN support:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/message/54183#54183" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/message/54183#54183&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sans notes on this:&lt;/P&gt;&lt;P&gt;&lt;A href="https://isc.sans.edu/forums/diary/Subscribing+to+the+DShield+Top+20+on+a+Palo+Alto+Networks+Firewall/19365/" target="_blank" rel="noopener"&gt;https://isc.sans.edu/forums/diary/Subscribing+to+the+DShield+Top+20+on+a+Palo+Alto+Networks+Firewall/19365/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Others listed on this site:&lt;/P&gt;&lt;P&gt;&lt;A href="http://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt" target="_blank" rel="noopener"&gt;http://rules.emergingthreats.net/fwrules/emerging-Block-IPs.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://malc0de.com/bl/IP_Blacklist.txt" target="_blank" rel="noopener"&gt;http://malc0de.com/bl/IP_Blacklist.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://panwdbl.appspot.com/lists/openbl.txt" target="_blank" rel="noopener"&gt;http://panwdbl.appspot.com/lists/openbl.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://panwdbl.appspot.com/" target="_blank" rel="noopener"&gt;http://panwdbl.appspot.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://cinsscore.com/list/ci-badguys.txt" target="_blank" rel="noopener"&gt;http://cinsscore.com/list/ci-badguys.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 17:04:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/298609#M78229</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-11-14T17:04:02Z</dc:date>
    </item>
    <item>
      <title>Re: EDL in vsys environment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/313798#M80986</link>
      <description>&lt;P&gt;After months working with TAC, finally got a solid answer,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my case,&amp;nbsp; we have multiple pair of 5260, each pair is licensed for 125 vsys,&amp;nbsp; and we want to take IP block list feed from &lt;A href="https://stingar.security.duke.edu/%20" target="_self"&gt;Duke University Stingar project&lt;/A&gt;&amp;nbsp;and apply it as inbound and outbound drop rule on every vsys.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The 5260 currently support&amp;nbsp;&lt;SPAN&gt;150000 entries&amp;nbsp;for IP list.&amp;nbsp; It is 150000 total for 125 vsys, that comes out to be 1200 entries per vsys.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If the EDL list is not apply to any security rule, it does not count toward the EDL entries limit.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;There is a feature request&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;SPAN&gt;13759: “&lt;/SPAN&gt;&lt;SPAN&gt;Ability to push a shared EDL object from Panorama to Firewall”.&amp;nbsp; &amp;nbsp;That will change the behavior of the "shared" EDL.&amp;nbsp; &amp;nbsp; If you feel you can benefit from this feature enhancement, please speak with your PAN rep/SE to cast your vote for FR #13759.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;E&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Mar 2020 16:53:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/313798#M80986</guid>
      <dc:creator>nextgenhappines</dc:creator>
      <dc:date>2020-03-01T16:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: EDL in vsys environment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/403996#M91856</link>
      <description>&lt;P&gt;I understand this is an old post, but does anyone have an update on this? We are wanting to leverage some IP block lists but don't want to be limited to a few hundred addresses&lt;/P&gt;</description>
      <pubDate>Thu, 29 Apr 2021 17:52:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/edl-in-vsys-environment/m-p/403996#M91856</guid>
      <dc:creator>JWinkler</dc:creator>
      <dc:date>2021-04-29T17:52:52Z</dc:date>
    </item>
  </channel>
</rss>

