<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restricting users to Internet only in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/restricting-users-to-internet-only/m-p/11609#M8535</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While those &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;groups (IP range\VLAN) are accessing internal resources, is the same traffic passing through the PAN firewall....?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, then you can create a policy to block internal resources base on user-group or source IP subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="security-policy.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/11463_security-policy.JPG.jpg" style="width: 620px; height: 324px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Feb 2014 03:36:18 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-02-06T03:36:18Z</dc:date>
    <item>
      <title>Restricting users to Internet only</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restricting-users-to-internet-only/m-p/11608#M8534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How can I restrict a certain group (ip range\VLAN) to internet only access.?&amp;nbsp; I don't want them to get to internal network shares with unfamiliar devices. We use Aruba Clear pass to authenticate and assign IPs and the PA 500 sits on the parameter. I know the answer is not the PA but probably a mixture of my other network devices.&lt;/P&gt;&lt;P&gt;Clearpass Device manager and Juniper 4200 switches with cisco switches in IDF&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 02:54:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restricting-users-to-internet-only/m-p/11608#M8534</guid>
      <dc:creator>MemphisBrothers</dc:creator>
      <dc:date>2014-02-06T02:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting users to Internet only</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restricting-users-to-internet-only/m-p/11609#M8535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While those &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;groups (IP range\VLAN) are accessing internal resources, is the same traffic passing through the PAN firewall....?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, then you can create a policy to block internal resources base on user-group or source IP subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="security-policy.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/11463_security-policy.JPG.jpg" style="width: 620px; height: 324px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 03:36:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restricting-users-to-internet-only/m-p/11609#M8535</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-02-06T03:36:18Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting users to Internet only</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restricting-users-to-internet-only/m-p/11610#M8536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the layer 3 traffic is occurring on the Juniper or Cisco switches, you would need to implement the restrictions at that point of the traffic path.&amp;nbsp; As Hulk notes, if the traffic reaches the Palo Alto before the destination then a rule here can restrict the access.&amp;nbsp; But it sounds like you have internal layer 3 connections that are permitted without reaching the Palo Alto.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;both Cisco and Juniper switches perform this function via packet based (not session based) filters.&amp;nbsp; You create the allow filter and apply this to the layer 3 interface on the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Juniper switches you would use the feature firewall filters applied to the RVI (Routed Vlan interface) on the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Juniper Documentation&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.juniper.net/techpubs/en_US/junos12.1/information-products/pathway-pages/config-guide-firewall-filter/config-guide-firewall-filter.html" title="http://www.juniper.net/techpubs/en_US/junos12.1/information-products/pathway-pages/config-guide-firewall-filter/config-guide-firewall-filter.html"&gt;Firewall Filters Configuration Guide - Technical Documentation - Support - Juniper Networks&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Free Day One book on the feature:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.juniper.net/us/en/community/junos/training-certification/day-one/fundamentals-series/configuring-junos-policies/" title="http://www.juniper.net/us/en/community/junos/training-certification/day-one/fundamentals-series/configuring-junos-policies/"&gt;http://www.juniper.net/us/en/community/junos/training-certification/day-one/fundamentals-series/configuring-junos-policies/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Cisco switches the feature is ACL (access control lists)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Documentation&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00800a5b9a.shtml" title="http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00800a5b9a.shtml"&gt;Configuring IP Access Lists - Cisco Systems&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Feb 2014 13:31:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restricting-users-to-internet-only/m-p/11610#M8536</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-02-08T13:31:31Z</dc:date>
    </item>
  </channel>
</rss>

