<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Default EDLs and manual exceptions in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/default-edls-and-manual-exceptions/m-p/346298#M86502</link>
    <description>&lt;P&gt;I'm working through a best practices assessment and one of the recommendations is to create security policies to deny traffic inbound or outbound to the two default external dynamic lists:&amp;nbsp;'Palo Alto Networks - Known malicious IP addresses' and&amp;nbsp;&amp;nbsp;'Palo Alto Networks - High risk IP addresses'. My concern, though, is that we have multiple sites connected via VPN, as well as numerous business critical connections. I would like to be able to put an exception in for these in advance, if possible, to make sure that if one of those critical IPs somehow gets added to the list we don't lose a connection to a remote site, or or drop a vendor connection. Unfortunately, it doesn't appear that there's any option to add manual entries, or override the EDL. The next option that comes to mind, then, would be to put this deny rule after all the other allow rules, which somewhat defeats the point of a 'deny evil IPs' rule. Any thoughts, or suggestions?&lt;/P&gt;</description>
    <pubDate>Tue, 01 Sep 2020 17:27:22 GMT</pubDate>
    <dc:creator>JessicaDavis</dc:creator>
    <dc:date>2020-09-01T17:27:22Z</dc:date>
    <item>
      <title>Default EDLs and manual exceptions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-edls-and-manual-exceptions/m-p/346298#M86502</link>
      <description>&lt;P&gt;I'm working through a best practices assessment and one of the recommendations is to create security policies to deny traffic inbound or outbound to the two default external dynamic lists:&amp;nbsp;'Palo Alto Networks - Known malicious IP addresses' and&amp;nbsp;&amp;nbsp;'Palo Alto Networks - High risk IP addresses'. My concern, though, is that we have multiple sites connected via VPN, as well as numerous business critical connections. I would like to be able to put an exception in for these in advance, if possible, to make sure that if one of those critical IPs somehow gets added to the list we don't lose a connection to a remote site, or or drop a vendor connection. Unfortunately, it doesn't appear that there's any option to add manual entries, or override the EDL. The next option that comes to mind, then, would be to put this deny rule after all the other allow rules, which somewhat defeats the point of a 'deny evil IPs' rule. Any thoughts, or suggestions?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Sep 2020 17:27:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-edls-and-manual-exceptions/m-p/346298#M86502</guid>
      <dc:creator>JessicaDavis</dc:creator>
      <dc:date>2020-09-01T17:27:22Z</dc:date>
    </item>
    <item>
      <title>Re: Default EDLs and manual exceptions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/default-edls-and-manual-exceptions/m-p/346338#M86504</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/139245"&gt;@JessicaDavis&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I really wouldn't be too terribly worried about any IP address that you actually require for legitimate business functions to make it onto these lists. I've actually&amp;nbsp;never heard of anyone actually having any issue with that. If you want to ensure that these never those site-to-site tunnels, you could always include the security rulebase entries allowing access to those resources above the entries blocking access to the dynamic lists; assuming that these are static resources you already know the peer addresses so just include the know peers in any policy above the EDLs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Again, I wouldn't be too worried about something accidentally being included on this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2020 00:56:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/default-edls-and-manual-exceptions/m-p/346338#M86504</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-09-02T00:56:53Z</dc:date>
    </item>
  </channel>
</rss>

