<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto firewall dual homed devices between two security zones in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-firewall-dual-homed-devices-between-two-security-zones/m-p/407183#M92214</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;incoming connections on one interface of the dual-homed system will be replied to via the default route (with the lowest metric) on the host. one interface will handle incoming connections properly, while the other will send replies out of the 'wrong' interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is just a single potential way to find dual homed hosts, and not a necessity&lt;/P&gt;</description>
    <pubDate>Mon, 17 May 2021 08:00:34 GMT</pubDate>
    <dc:creator>Thyrion</dc:creator>
    <dc:date>2021-05-17T08:00:34Z</dc:date>
    <item>
      <title>Palo Alto firewall dual homed devices between two security zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-firewall-dual-homed-devices-between-two-security-zones/m-p/406270#M92082</link>
      <description>&lt;P&gt;Is it possible to detect dual homed hosts connected to two or more security zones at the same time.&lt;/P&gt;</description>
      <pubDate>Wed, 12 May 2021 06:22:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-firewall-dual-homed-devices-between-two-security-zones/m-p/406270#M92082</guid>
      <dc:creator>JacobHusted</dc:creator>
      <dc:date>2021-05-12T06:22:54Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto firewall dual homed devices between two security zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-firewall-dual-homed-devices-between-two-security-zones/m-p/406369#M92093</link>
      <description>&lt;P&gt;you'll have many 'incomplete' sessions in one zone , and many non-syn-tcp in the other zone for incoming connections&lt;/P&gt;&lt;P&gt;outgoing you will not notice as the host will likely 'stick' to one interface for all/some of it's sessions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;only if the dual-homed system is set up as a gateway/router/... to pass along packets, you may see unexpected IP addresses in either zone. this can be addressed by enabling anti spoofing in a zone protection profile&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 May 2021 13:14:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-firewall-dual-homed-devices-between-two-security-zones/m-p/406369#M92093</guid>
      <dc:creator>Thyrion</dc:creator>
      <dc:date>2021-05-12T13:14:10Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto firewall dual homed devices between two security zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-firewall-dual-homed-devices-between-two-security-zones/m-p/407122#M92200</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80142"&gt;@JacobHusted&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Depending on the routing configured on these hosts there is no way to detect these hosts. Unlike what &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/170451"&gt;@Thyrion&lt;/a&gt;&amp;nbsp;wrote, it does not need to be the case that you will see a lot of incomplete sessions or sessions with wrong source IPs in the wrong zones so if these hosts are configured correctly then also the anti spoofing feature does not help to prevent such connections.&lt;/P&gt;
&lt;P&gt;So the best way probably to resolve these issues is to find out how it is possible for these hosts to simultanously connect to multiple networks behind your firewall and then try to implement preventions to eliminate this possibility for the users. If this still need to be possible for at least some computers, make sure you secure the network as good as possible from both security zones &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 16 May 2021 16:02:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-firewall-dual-homed-devices-between-two-security-zones/m-p/407122#M92200</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-05-16T16:02:21Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto firewall dual homed devices between two security zones</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-firewall-dual-homed-devices-between-two-security-zones/m-p/407183#M92214</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;incoming connections on one interface of the dual-homed system will be replied to via the default route (with the lowest metric) on the host. one interface will handle incoming connections properly, while the other will send replies out of the 'wrong' interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is just a single potential way to find dual homed hosts, and not a necessity&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 08:00:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-firewall-dual-homed-devices-between-two-security-zones/m-p/407183#M92214</guid>
      <dc:creator>Thyrion</dc:creator>
      <dc:date>2021-05-17T08:00:34Z</dc:date>
    </item>
  </channel>
</rss>

