<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fresh from scratch firewall config in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/fresh-from-scratch-firewall-config/m-p/384668#M90062</link>
    <description>&lt;P&gt;It is always a best practice to create a standard URL filtering profile that blocks unwanted URL categories based upon organization's requirement. Attach that filtering profile with the Firewall policies created along with other content ID profiles, in addition to the policies created with App-based and port-based.&lt;/P&gt;</description>
    <pubDate>Tue, 09 Feb 2021 01:57:42 GMT</pubDate>
    <dc:creator>Saurabh-Bhansali</dc:creator>
    <dc:date>2021-02-09T01:57:42Z</dc:date>
    <item>
      <title>Fresh from scratch firewall config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fresh-from-scratch-firewall-config/m-p/384617#M90059</link>
      <description>&lt;P&gt;So i can't find much on what rule of thumb to follow. If you know what applications you want to be allowed, should you start with the level4 version of the rule using just a port and then migrate to app based rule? Once app id identifies it properly migrate using best practices? Do you start off with the app id version of the firewall rule right away?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 21:12:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fresh-from-scratch-firewall-config/m-p/384617#M90059</guid>
      <dc:creator>Johndbabio1</dc:creator>
      <dc:date>2021-02-08T21:12:33Z</dc:date>
    </item>
    <item>
      <title>Re: Fresh from scratch firewall config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fresh-from-scratch-firewall-config/m-p/384628#M90060</link>
      <description>&lt;P&gt;If you are confident the application is correct, why bother with the port based rule?&lt;/P&gt;&lt;P&gt;If you are not so confident, use both. Application rule comes first, port based rule below. If the application rule didn't match (for whatever reason), the fallback rule based on the port will catch the traffic. The identified application on the port rule can be used to fine-tune the application rule above.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 21:37:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fresh-from-scratch-firewall-config/m-p/384628#M90060</guid>
      <dc:creator>JoergSchuetter</dc:creator>
      <dc:date>2021-02-08T21:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: Fresh from scratch firewall config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fresh-from-scratch-firewall-config/m-p/384668#M90062</link>
      <description>&lt;P&gt;It is always a best practice to create a standard URL filtering profile that blocks unwanted URL categories based upon organization's requirement. Attach that filtering profile with the Firewall policies created along with other content ID profiles, in addition to the policies created with App-based and port-based.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2021 01:57:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fresh-from-scratch-firewall-config/m-p/384668#M90062</guid>
      <dc:creator>Saurabh-Bhansali</dc:creator>
      <dc:date>2021-02-09T01:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: Fresh from scratch firewall config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fresh-from-scratch-firewall-config/m-p/384736#M90072</link>
      <description>&lt;P&gt;Hi there,&lt;BR /&gt;If you are confident the application is correct, why bother with the port based rule?&lt;BR /&gt;If you are not so confident, use both. Application rule comes first, port based rule below. If the application rule didn't match (for whatever reason), the fallback rule based on the port will catch the traffic. The identified application on the port rule can be used to fine-tune the application rule above.&amp;nbsp;&lt;BR /&gt;All the best!&lt;/P&gt;</description>
      <pubDate>Mon, 27 Dec 2021 17:57:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fresh-from-scratch-firewall-config/m-p/384736#M90072</guid>
      <dc:creator>jimzam</dc:creator>
      <dc:date>2021-12-27T17:57:15Z</dc:date>
    </item>
  </channel>
</rss>

