<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Intrazone-default rule in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/313438#M80932</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I am talking about intrazone rule which allows traffic between same zone like outside to outside but not outside to inside.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83320" target="_blank"&gt;@JoergSchuetter&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;Intrazone default will not allow traffic from outside to inside zone for sure.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Mayur&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 28 Feb 2020 05:20:17 GMT</pubDate>
    <dc:creator>SutareMayur</dc:creator>
    <dc:date>2020-02-28T05:20:17Z</dc:date>
    <item>
      <title>Intrazone-default rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/313329#M80916</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like some advice on Palo Alto's default intrazone-default rule.&amp;nbsp; Unless I have a drop any any above this rule I see IP's from all over the public internet hitting my Palo Alto and being accepted on the intrazone rule as the traffic is from zone outside to zone inside.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want all of these random public IP's to be blocked and not accepted by the firewall.&amp;nbsp; In one of the training modules I went through it was mentioned that adding a drop any rule above the default rule could make the firewall not function correctly and legitimate traffic may be dropped that is needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best practice on this.&amp;nbsp; What are others doing, adding a drop any any, or letting the intrazone-default accept traffic on the outside interface?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 15:28:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/313329#M80916</guid>
      <dc:creator>mjensen40400</dc:creator>
      <dc:date>2020-02-27T15:28:02Z</dc:date>
    </item>
    <item>
      <title>Re: Intrazone-default rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/313337#M80918</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/131513"&gt;@mjensen40400&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the post-rules (managing the firewalls via Panorama), we drop traffic from the Internet. Traffic from inside gets rejected (to let the client know that the connection is not possible, instead of letting it wait for a timeout). We don't use of the pre-defined interzone-default and intrazone-default rules, all traffic is denied at the end.&lt;/P&gt;&lt;P&gt;The policies which grant the necessary traffic is places in the pre-rules (in other words: above the post-rules / the deny rules). Access to the firewall itself (e.g. Global Protect Portal, ...) needs to be granted explicit.&lt;/P&gt;&lt;P&gt;Summary: all allow rules are placed in the pre-rules, all deny rules are placed in the post-rules.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 16:01:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/313337#M80918</guid>
      <dc:creator>JoergSchuetter</dc:creator>
      <dc:date>2020-02-27T16:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: Intrazone-default rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/313340#M80920</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83320"&gt;@JoergSchuetter&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you put any any blocked rule above default rules, it will block legitimate traffic like traffic between trust-to-trust or LAN-to-LAN as you have kept any-to-any zone blocked and this rule will get matched before default rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Practice would be -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you want to block traffic from untrust-to-untrust which is getting matched due to intrazone default allowed, put one rule at the end like,&lt;/P&gt;&lt;P&gt;SZONE untraust -to- DZONE untrust --drop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So unwanted traffic which is getting matched currently&amp;nbsp; will get dropped.&amp;nbsp; But if you have any IPSEC tunnel configured on this firewall, please make sure you add explicit policy above this rule to match communication between peer IP addresses as it uses default intrazone policy normally.&lt;/P&gt;&lt;P&gt;This way, you can block unwanted traffic which is getting allowed currently without creating any impact on legitimate traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mayur&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 16:21:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/313340#M80920</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2020-02-27T16:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: Intrazone-default rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/313342#M80921</link>
      <description>&lt;P&gt;Hmmm... not sure if I am reading your thread correctly but the intrazone-default policy will not allow traffic from zone outside to zone inside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But of course... i have read it so many times... I may have confused myself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 16:33:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/313342#M80921</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2020-02-27T16:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: Intrazone-default rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/313438#M80932</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I am talking about intrazone rule which allows traffic between same zone like outside to outside but not outside to inside.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83320" target="_blank"&gt;@JoergSchuetter&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;Intrazone default will not allow traffic from outside to inside zone for sure.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Mayur&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 05:20:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/313438#M80932</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2020-02-28T05:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: Intrazone-default rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/615868#M121869</link>
      <description>&lt;P&gt;Hello All,&lt;BR /&gt;Any solution for this?&lt;BR /&gt;Thankyou&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 13:30:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/615868#M121869</guid>
      <dc:creator>JeanPaul222</dc:creator>
      <dc:date>2024-10-31T13:30:48Z</dc:date>
    </item>
    <item>
      <title>Re: Intrazone-default rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/615875#M121871</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1035429259"&gt;@JeanPaul222&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hello All,&lt;BR /&gt;Any solution for this?&lt;BR /&gt;Thankyou&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;A solution for what?&amp;nbsp; Can you cite specific on what you're looking for?&amp;nbsp; The earlier comments in this almost 5 year old thread didn't always follow the right logic of "intra" and "inter."&amp;nbsp; By sharing the specific details of what you're trying to solve that would be easier to provide a response.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 16:19:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/615875#M121871</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2024-10-31T16:19:34Z</dc:date>
    </item>
    <item>
      <title>Re: Intrazone-default rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/616271#M121940</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1035429259"&gt;@JeanPaul222&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you asking if PANW has a recommendation for the intrazone-default rule?&amp;nbsp; Not that I know.&amp;nbsp; The NGFW will drop packets if it is not listening on the TCP/UDP port.&amp;nbsp; It will not allow pings if not enabled in the interface management profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Like some others, I desire a little more protection.&amp;nbsp; I create a universal drop rule from the outside.&amp;nbsp; It is VERY important to make sure you have allow rules for L2L VPNs, GlobalProtect, BGP, etc. before doing this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a thread where an engineer recommends changing the intrazone-default rule to deny, and he makes some valid points.&amp;nbsp; &lt;A href="https://live.paloaltonetworks.com/t5/next-generation-firewall/should-i-override-the-intrazone-default-to-deny/td-p/581801" target="_blank"&gt;https://live.paloaltonetworks.com/t5/next-generation-firewall/should-i-override-the-intrazone-default-to-deny/td-p/581801&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 18:14:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/intrazone-default-rule/m-p/616271#M121940</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-11-06T18:14:13Z</dc:date>
    </item>
  </channel>
</rss>

