<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Rule bypassed when specific ip entered for destination (PanOS 8.1) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/rule-bypassed-when-specific-ip-entered-for-destination-panos-8-1/m-p/349989#M86916</link>
    <description>&lt;P&gt;Is the Palo performing NAT translations for the inbound traffic? If so, is your security policy defining the pre-NAT IP and post-NAT zone?&lt;/P&gt;</description>
    <pubDate>Thu, 17 Sep 2020 04:56:08 GMT</pubDate>
    <dc:creator>Braden_Tolman</dc:creator>
    <dc:date>2020-09-17T04:56:08Z</dc:date>
    <item>
      <title>Rule bypassed when specific ip entered for destination (PanOS 8.1)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rule-bypassed-when-specific-ip-entered-for-destination-panos-8-1/m-p/349814#M86897</link>
      <description>&lt;P&gt;I have a rule that has been failing to allow connections to the internal system. To test i've set up the rules below. (IP's obfuscated)&lt;BR /&gt;When I run&lt;BR /&gt;&amp;gt; test security-policy-match source 1.1.1.206 destination 2.2.2.226 protocol 22&lt;BR /&gt;the response is&lt;/P&gt;&lt;P&gt;"External-TEST-OPEN; index: 2" {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am currently able to connect from external to internal with the External-TEST-OPEN, but why is it that when i put in the specific internal system ip that i can't connect?&amp;nbsp; What am i missing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rick.&lt;BR /&gt;-------------------------------&lt;/P&gt;&lt;P&gt;TEST-Dest-IP {&lt;BR /&gt;from untrust;&lt;BR /&gt;source 1.1.1.206;&lt;BR /&gt;to "Zone Internal";&lt;BR /&gt;destination 2.2.2.226;&lt;BR /&gt;service any;&lt;BR /&gt;application ssh;&lt;BR /&gt;action allow;&lt;BR /&gt;category any;&lt;BR /&gt;rule-type universal;&lt;BR /&gt;}&lt;BR /&gt;External-TEST-OPEN {&lt;BR /&gt;to "Zone Internal";&lt;BR /&gt;from untrust;&lt;BR /&gt;source [ 1.1.1.206 1.1.1.201];&lt;BR /&gt;destination any;&lt;BR /&gt;source-user any;&lt;BR /&gt;category any;&lt;BR /&gt;application ssh;&lt;BR /&gt;service any;&lt;BR /&gt;hip-profiles any;&lt;BR /&gt;action allow;&lt;BR /&gt;rule-type universal;&lt;BR /&gt;log-setting Log_Forwarding-Traffic;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2020 14:38:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rule-bypassed-when-specific-ip-entered-for-destination-panos-8-1/m-p/349814#M86897</guid>
      <dc:creator>rwolsen</dc:creator>
      <dc:date>2020-09-16T14:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: Rule bypassed when specific ip entered for destination (PanOS 8.1)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rule-bypassed-when-specific-ip-entered-for-destination-panos-8-1/m-p/349989#M86916</link>
      <description>&lt;P&gt;Is the Palo performing NAT translations for the inbound traffic? If so, is your security policy defining the pre-NAT IP and post-NAT zone?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2020 04:56:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rule-bypassed-when-specific-ip-entered-for-destination-panos-8-1/m-p/349989#M86916</guid>
      <dc:creator>Braden_Tolman</dc:creator>
      <dc:date>2020-09-17T04:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: Rule bypassed when specific ip entered for destination (PanOS 8.1)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rule-bypassed-when-specific-ip-entered-for-destination-panos-8-1/m-p/350194#M86934</link>
      <description>&lt;P&gt;No, we are not NAT'ing.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2020 17:49:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rule-bypassed-when-specific-ip-entered-for-destination-panos-8-1/m-p/350194#M86934</guid>
      <dc:creator>rwolsen</dc:creator>
      <dc:date>2020-09-17T17:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: Rule bypassed when specific ip entered for destination (PanOS 8.1)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rule-bypassed-when-specific-ip-entered-for-destination-panos-8-1/m-p/350623#M86983</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;can you please set up the command this way:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;test security-policy-match &lt;STRONG&gt;from untrust&lt;/STRONG&gt;&amp;nbsp;source 1.1.1.206 &lt;STRONG&gt;to Zone Internal&lt;/STRONG&gt; destination 2.2.2.226 &lt;STRONG&gt;destination-port&lt;/STRONG&gt; 22 &lt;STRONG&gt;protocol 6&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- if i remember correctly zones names with blanks in it wont work on CLI&lt;/P&gt;&lt;P&gt;- with protocol Palo does not mean the application. Check this:&lt;/P&gt;&lt;P&gt;&lt;A href="https://en.wikipedia.org/wiki/List_of_IP_protocol_numbers" target="_blank"&gt;https://en.wikipedia.org/wiki/List_of_IP_protocol_numbers&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the security policies it looks like they have been manipulated. Could you please copy the exact output, for related policies, of this command?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;gt; show running security-policy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Sep 2020 20:22:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rule-bypassed-when-specific-ip-entered-for-destination-panos-8-1/m-p/350623#M86983</guid>
      <dc:creator>Rene_Boehme</dc:creator>
      <dc:date>2020-09-19T20:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: Rule bypassed when specific ip entered for destination (PanOS 8.1)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rule-bypassed-when-specific-ip-entered-for-destination-panos-8-1/m-p/350669#M86989</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/138831"&gt;@Rene_Boehme&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;The CLI can handle spaces fine, you just have to group them properly so its not escaped. So in the example that you have you would actually need to have it like so.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;test security-policy-match&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;from untrust&lt;/STRONG&gt;&amp;nbsp;source 1.1.1.206&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;to "Zone Internal"&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;destination 2.2.2.226&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;destination-port&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;22&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;protocol 6&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Sep 2020 04:14:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rule-bypassed-when-specific-ip-entered-for-destination-panos-8-1/m-p/350669#M86989</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-09-20T04:14:17Z</dc:date>
    </item>
  </channel>
</rss>

