<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone for vpn in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/zone-for-vpn/m-p/377719#M89376</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;, keep it separate, that way you have more control as to who can do what. I would also keep the wired and wireless separate for the same reasons. Try to go with the smallest zero trust you can get away with. This will help prevent wide spread lateral movement and still control who has access to what resources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Mon, 04 Jan 2021 18:56:44 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2021-01-04T18:56:44Z</dc:date>
    <item>
      <title>Zone for vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-for-vpn/m-p/377702#M89373</link>
      <description>&lt;P&gt;Hello ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have currently three diffent zones defined .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Zone A vlan 100. For wired users&amp;nbsp;&lt;/P&gt;&lt;P&gt;Zone B vlan 200 for wireless users&amp;nbsp;&lt;/P&gt;&lt;P&gt;Zone V tunnel/ loopback interface for Global protect users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All the above users mentioned are corp users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now customer wants to create. single zone called "All users" and want to put vlan 100 200 and loopback/ tunnel into it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it wise to use same zone for GP users ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it doable ? What are the challenges of we have a single common zone for user traffic ( wired+wireless+gp users )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 18:18:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-for-vpn/m-p/377702#M89373</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2021-01-04T18:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: Zone for vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-for-vpn/m-p/377716#M89374</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/133520"&gt;@FWPalolearner&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hello ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have currently three diffent zones defined .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Zone A vlan 100. For wired users&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Zone B vlan 200 for wireless users&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Zone V tunnel/ loopback interface for Global protect users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All the above users mentioned are corp users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now customer wants to create. single zone called "All users" and want to put vlan 100 200 and loopback/ tunnel into it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it wise to use same zone for GP users ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it doable ? What are the challenges of we have a single common zone for user traffic ( wired+wireless+gp users )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;In general a good security practice would be to keep remote / VPN users in a separate security zone.&amp;nbsp; There would be some mitigating factors for not doing so like an "always-on" VPN, but still to ensure the most visibility it would be better to keep VPN users in a separate zone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's very doable to have all in the same zone.&amp;nbsp; You just need to weigh the various components of the reasons for keeping them separate.&amp;nbsp; Functionally what's the benefit to have wired and wireless users that are internal in a separate zone?&amp;nbsp; Are they a different user or business function?&amp;nbsp; Personally I don't see the need to break out "on-prem" users into different zone, but there might be a logical reason to do so.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For a VPN user there's more of a logical reason to keep those users/devices in a separate zone even if it's still a corporate owned device.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 18:32:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-for-vpn/m-p/377716#M89374</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2021-01-04T18:32:46Z</dc:date>
    </item>
    <item>
      <title>Re: Zone for vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-for-vpn/m-p/377718#M89375</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;.thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wired and wireless are separate currently because of historical reasons .&lt;/P&gt;&lt;P&gt;Customer goal is to have single zone for corp users no matter from where they are coming wired wireless or through GP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I fully agree that having a separate zone for gp makes it more granular but that's the customer requirements.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you mean it is doable to have all in same zone I mean vlan subinterfaces plus loopback/ tunnel interface?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 18:51:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-for-vpn/m-p/377718#M89375</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2021-01-04T18:51:06Z</dc:date>
    </item>
    <item>
      <title>Re: Zone for vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-for-vpn/m-p/377719#M89376</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;, keep it separate, that way you have more control as to who can do what. I would also keep the wired and wireless separate for the same reasons. Try to go with the smallest zero trust you can get away with. This will help prevent wide spread lateral movement and still control who has access to what resources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 18:56:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-for-vpn/m-p/377719#M89376</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-01-04T18:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: Zone for vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-for-vpn/m-p/377720#M89377</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/133520"&gt;@FWPalolearner&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;.thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Wired and wireless are separate currently because of historical reasons .&lt;/P&gt;
&lt;P&gt;Customer goal is to have single zone for corp users no matter from where they are coming wired wireless or through GP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I fully agree that having a separate zone for gp makes it more granular but that's the customer requirements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So you mean it is doable to have all in same zone I mean vlan subinterfaces plus loopback/ tunnel interface?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Yes, there's not a technical limitation for having all be in the same zone, as long as the interface type match the zone.&amp;nbsp; For instance L3 zone, but L2 Interface type.&amp;nbsp; (I'm fairly certain they need to match.&amp;nbsp; I know you can't have a vwire interface in a L3 zone.)&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 18:59:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-for-vpn/m-p/377720#M89377</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2021-01-04T18:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: Zone for vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/zone-for-vpn/m-p/377833#M89404</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/133520"&gt;@FWPalolearner&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You're doing to exact opposite of what anyone would recommend you do from a security aspect, but since you're saying customer and not internal to your org the only thing you can do is advise the customer that it's not the best idea and explain the reasons why.&lt;/P&gt;
&lt;P&gt;The only technical reason that this wouldn't be doable is if you have to mix interface types as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;mentioned. You can't have a zone contain mis-matched interface types. Short of that, there's not a technical reason you can't toss all of your interfaces into the same zone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The one thing that I would recommend if you do this, is that you make sure intrazone-default or any other intrazone rule you may have created is setup to log properly. Without overriding that setting, the firewall won't be logging much which could become a massive issue if you ever get called about the customer being breached.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 23:56:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/zone-for-vpn/m-p/377833#M89404</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-01-04T23:56:58Z</dc:date>
    </item>
  </channel>
</rss>

