<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security policy between layer 2 zones in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/303282#M78959</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your issue is that you created a single vlan on the FW, and associated both interfaces to that vlan.&lt;/P&gt;&lt;P&gt;The put the zones into the same vlan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You should create 2 vlans on the FW and put vlan10 in PC1 zone, and vlan20 onto PC2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SteveCantwell_0-1576090398041.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/22992i52EF6F958ABC3605/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SteveCantwell_0-1576090398041.png" alt="SteveCantwell_0-1576090398041.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Dec 2019 18:53:38 GMT</pubDate>
    <dc:creator>S.Cantwell</dc:creator>
    <dc:date>2019-12-11T18:53:38Z</dc:date>
    <item>
      <title>security policy between layer 2 zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/302930#M78898</link>
      <description>&lt;P&gt;Hi, I am new to Palo Alto, so this might be a dumb question, below is the setup I have been trying to get it to work -&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;two layer2 zones; Zone1 and Zone2&lt;/LI&gt;&lt;LI&gt;three PCs, PC1; PC2 and PC3&lt;/LI&gt;&lt;LI&gt;PC1 in Zone1&lt;/LI&gt;&lt;LI&gt;PC2 and PC3 are in Zone2&lt;/LI&gt;&lt;LI&gt;all three PCs are on the same subnet&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;question: I am trying to create a security policy to only allow PC1 to talk to PC2, and deny everything else&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is it doable?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2019 15:21:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/302930#M78898</guid>
      <dc:creator>LionKin1984</dc:creator>
      <dc:date>2019-12-10T15:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: security policy between layer 2 zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/302950#M78902</link>
      <description>&lt;P&gt;Not a dumb question at all... let's review some info, and set expectations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PC1 is in Zone1.&lt;/P&gt;&lt;P&gt;PC2 is in Zone2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You did not mention at what layer (VWire, Layer2, or Layer3 interface) you are doing your routing (if any)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If all PCs are plugged into a switch (downstream from FW), then the switch will intercept the arps and the FW will not be an inspection point.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can plug PC1 physically into a port assigned to Zone1 (and do the same for PC2, assigned to Zone2) and now, the firewall would inspect traffic between both PCs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ideally... PC1 in Zone1, should be a different subnet than PC2/PC3, so that the FW is the default gateway (at L3) to route and inspect/allow traffic to PC2 and deny traffic to PC3.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To summarize, the FW must see the traffic ingressing to the Zone1.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2019 16:23:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/302950#M78902</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-12-10T16:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: security policy between layer 2 zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/303146#M78928</link>
      <description>&lt;P&gt;Hi Steve, thanks for you reply, we cant change the IP addresses of the devices hence we have to use layer2 ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are &lt;STRONG&gt;two Cisco switches&lt;/STRONG&gt;:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Switch 1,&lt;/STRONG&gt; where all PCs are connected to, two VLANs created on this switch: -&lt;/P&gt;&lt;P&gt;PC1 is in VLAN10&lt;BR /&gt;PC2 and PC3 are in VLAN20&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Aggregation Switch&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;VLAN10 and VLAN20 are ‘Trunked’ to the aggregation switch.&lt;/P&gt;&lt;P&gt;Access ports are used to connect aggregation switch to the firewall&lt;/P&gt;&lt;P&gt;Two Layer 2 interfaces created on the firewall (one for VLAN10, one for VLAN20)&lt;/P&gt;&lt;P&gt;Two Layer 2 zones created on the firewall&lt;/P&gt;&lt;P&gt;One VLAN created on the firewall and both Layer 2 interfaces are in this VLAN&lt;/P&gt;&lt;P&gt;Security policy (universal) created and worked between two Layer 2 zones but everything can talk to everything between zones which is no what I want, I only want PC1 to talk to PC2 and deny everything else&lt;/P&gt;&lt;P&gt;i&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="layer 2 policy.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/22965i0B2EF30D78B05A19/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="layer 2 policy.png" alt="layer 2 policy.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Please find attach image for reference.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 08:48:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/303146#M78928</guid>
      <dc:creator>LionKin1984</dc:creator>
      <dc:date>2019-12-11T08:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: security policy between layer 2 zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/303282#M78959</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your issue is that you created a single vlan on the FW, and associated both interfaces to that vlan.&lt;/P&gt;&lt;P&gt;The put the zones into the same vlan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You should create 2 vlans on the FW and put vlan10 in PC1 zone, and vlan20 onto PC2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SteveCantwell_0-1576090398041.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/22992i52EF6F958ABC3605/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SteveCantwell_0-1576090398041.png" alt="SteveCantwell_0-1576090398041.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 18:53:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/303282#M78959</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-12-11T18:53:38Z</dc:date>
    </item>
    <item>
      <title>Re: security policy between layer 2 zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/303366#M78975</link>
      <description>&lt;P&gt;Hi Steve, I have created two VLANs and a layer 2 security policy on the firewall, now they cant ping each other ...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 08:17:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/303366#M78975</guid>
      <dc:creator>LionKin1984</dc:creator>
      <dc:date>2019-12-12T08:17:00Z</dc:date>
    </item>
    <item>
      <title>Re: security policy between layer 2 zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/303498#M78997</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Making progress though right?&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&amp;nbsp; Not really.&lt;/P&gt;&lt;P&gt;I think I realized that I isolated you now, with vlan10 and vlan20 not being able forward arp/broadcast traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So... back to original idea of 2 ports in a single L2 vlan on the FW.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if PC1 is on port1 and PC2 is on port2 (both ports in same vlan on FW) then the following should happen.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PC1 attempts to ping PC2.&lt;/P&gt;&lt;P&gt;Not knowing his L2 mac address, he will arp out (broadcast)&lt;/P&gt;&lt;P&gt;Traffic ingress switch, egresses out the trunk port.&lt;/P&gt;&lt;P&gt;Aggregation switch should fwd (untagged tag) packet to port1 of FW.&lt;/P&gt;&lt;P&gt;FW will/should allow broadcast to go out port2 and reverse down trunk to PC2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once arp resolution is determined, then security policy should be something like like&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SZ (fw_vlan) SA (PC1) ==&amp;gt; to DZ (fw_vlan) DA (PC2) ==&amp;gt; app of ping ==&amp;gt; application-default a ==&amp;gt; ALLOW&lt;/P&gt;&lt;P&gt;next rule is&lt;/P&gt;&lt;P&gt;SZ (fw_vlan) SA (PC1) ==&amp;gt; to DZ (fw_vlan) DA (ANY) ==&amp;gt; ANY ==&amp;gt; ANY&amp;nbsp; ==&amp;gt; DENY&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you missed this rule, then the intrazone rule is what you hit and allowed you&amp;nbsp; to ping PC3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This may be exactly what you had (and I would apologize for going down a rabbit hole... &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You would need to look at your traffic log to see/confirm that the traffic from PC1 is hitting PC2 and also confirm.if traffic is passing and then denying for PC1 to PC3 traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let us know.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 21:19:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/303498#M78997</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-12-12T21:19:03Z</dc:date>
    </item>
    <item>
      <title>Re: security policy between layer 2 zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/303553#M79012</link>
      <description>&lt;P&gt;Thanks again for you reply Steve, that makes lot of sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;with your help, i have managed to get it sorted, i created the rules as you suggested and also created three 'objects', however i messed up with the mask when creating the network object (instead of 10.10.10.1/32 I put it down as 10.10.10.1/24 (whole subnet...), school boy error I know)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2019 08:55:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-between-layer-2-zones/m-p/303553#M79012</guid>
      <dc:creator>LionKin1984</dc:creator>
      <dc:date>2019-12-13T08:55:42Z</dc:date>
    </item>
  </channel>
</rss>

