<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability protection ip exception in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-ip-exception/m-p/350289#M86951</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/128760"&gt;@lee.curtis&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129900"&gt;@Abdul-Fattah&lt;/a&gt;&amp;nbsp; alluded to, you're going to want to build a separate security rulebase entry to allow the traffic. You can programmatically add an exception relatively easy, but it is simply just building an IP address exception for each signature. Just build out a new security rulebase entry and remove it when the penetration test is done.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 18 Sep 2020 04:00:15 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2020-09-18T04:00:15Z</dc:date>
    <item>
      <title>Vulnerability protection ip exception</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-ip-exception/m-p/350237#M86942</link>
      <description>&lt;P&gt;We have our regular penetration tests coming up and we need to allow the IP addresses that are doing the testing to scan our network. Is there a way to create an IP based vulnerability protection exception? I know how to create an exception for a specific threat, but is there a way to allow a specific IP or set of IPs through the vulnerability protection without allowing everyone through?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2020 22:12:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-ip-exception/m-p/350237#M86942</guid>
      <dc:creator>lee.curtis</dc:creator>
      <dc:date>2020-09-17T22:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability protection ip exception</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-ip-exception/m-p/350250#M86943</link>
      <description>&lt;P&gt;Is there a reason why u do not want to use separate security Policy to allow what you want, for these IPs !?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2020 23:03:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-ip-exception/m-p/350250#M86943</guid>
      <dc:creator>Abdul-Fattah</dc:creator>
      <dc:date>2020-09-17T23:03:34Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability protection ip exception</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-ip-exception/m-p/350289#M86951</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/128760"&gt;@lee.curtis&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129900"&gt;@Abdul-Fattah&lt;/a&gt;&amp;nbsp; alluded to, you're going to want to build a separate security rulebase entry to allow the traffic. You can programmatically add an exception relatively easy, but it is simply just building an IP address exception for each signature. Just build out a new security rulebase entry and remove it when the penetration test is done.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2020 04:00:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-ip-exception/m-p/350289#M86951</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-09-18T04:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability protection ip exception</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-ip-exception/m-p/350739#M86992</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/128760"&gt;@lee.curtis&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We do this regularly in our network where External Vendors do Pen test against our public facing applications.&lt;/P&gt;
&lt;P&gt;You will need security rule with source as Vendor Public IP and destination will be your External Interface public IP.&lt;/P&gt;
&lt;P&gt;For this security normally we do all security profiles as none and once Pen Testing is done then rule can be removed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Sep 2020 23:25:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-protection-ip-exception/m-p/350739#M86992</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2020-09-20T23:25:20Z</dc:date>
    </item>
  </channel>
</rss>

