<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow workstations to join domain controller in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/allow-workstations-to-join-domain-controller/m-p/409229#M92430</link>
    <description>&lt;P&gt;I just realize a mistake of not adding the dependency into the application rules when choosing 'active-directory' application. Thanks for your suggestion too, I will use it to fix other current issues in my firewall.&lt;/P&gt;</description>
    <pubDate>Wed, 26 May 2021 17:30:06 GMT</pubDate>
    <dc:creator>FoxOnTheRun</dc:creator>
    <dc:date>2021-05-26T17:30:06Z</dc:date>
    <item>
      <title>Allow workstations to join domain controller</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-workstations-to-join-domain-controller/m-p/409176#M92416</link>
      <description>&lt;P&gt;I am new to palo alto firewall. I have to configure the firewall rules to allow workstation to join the domain controller. The workstation is placed in LAN zone while the domain controller is placed in SRV zone. I have added the rule to allow LAN zone to authenticate with SRV zone using 'active directory' application and 'application-default' service, as well as 'dns' application. However, the workstation is unable to join the domain controller because the domain controller was unreachable. When I tried to allow all applications and service from LAN zone to SRV zone, the computer has no issue reaching the domain controller. I am not sure what I am doing wrong here and would appreciate some help.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 10:48:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-workstations-to-join-domain-controller/m-p/409176#M92416</guid>
      <dc:creator>FoxOnTheRun</dc:creator>
      <dc:date>2021-05-26T10:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: Allow workstations to join domain controller</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-workstations-to-join-domain-controller/m-p/409226#M92428</link>
      <description>&lt;P&gt;set your rule back to what you think it should be.&amp;nbsp; then add a rule directly below blocking all from LAN zone to SRV zone. set this to log session start and you will see what is being denied....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;there are many offerings on the web for required ports but I prefer to see for myself...&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 16:03:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-workstations-to-join-domain-controller/m-p/409226#M92428</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-05-26T16:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: Allow workstations to join domain controller</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-workstations-to-join-domain-controller/m-p/409229#M92430</link>
      <description>&lt;P&gt;I just realize a mistake of not adding the dependency into the application rules when choosing 'active-directory' application. Thanks for your suggestion too, I will use it to fix other current issues in my firewall.&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 17:30:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-workstations-to-join-domain-controller/m-p/409229#M92430</guid>
      <dc:creator>FoxOnTheRun</dc:creator>
      <dc:date>2021-05-26T17:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: Allow workstations to join domain controller</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-workstations-to-join-domain-controller/m-p/409235#M92431</link>
      <description>&lt;P&gt;I use the following apps with service application-default for traffic towards the domain controllers&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ntp&lt;/LI&gt;
&lt;LI&gt;dns&lt;/LI&gt;
&lt;LI&gt;ms-netlogon&lt;/LI&gt;
&lt;LI&gt;kerberos&lt;/LI&gt;
&lt;LI&gt;ldap&lt;/LI&gt;
&lt;LI&gt;msrpc&lt;/LI&gt;
&lt;LI&gt;active-directory&lt;/LI&gt;
&lt;LI&gt;netbios-ss&lt;/LI&gt;
&lt;LI&gt;ms-ds-smb-base&lt;/LI&gt;
&lt;LI&gt;ms-ds-smbv2&lt;/LI&gt;
&lt;LI&gt;ms-ds-smbv3&lt;/LI&gt;
&lt;LI&gt;net.tcp&lt;/LI&gt;
&lt;LI&gt;netbios-ns&lt;/LI&gt;
&lt;LI&gt;netbios-dg&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This allows domain joined clients and servers to communicate with the AD servers. For admin-tasks additional app-ids are required.&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 17:48:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-workstations-to-join-domain-controller/m-p/409235#M92431</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-05-26T17:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: Allow workstations to join domain controller</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-workstations-to-join-domain-controller/m-p/409971#M92520</link>
      <description>&lt;P&gt;Thanks for the help, turns out the dependencies were not enough and your solution has helped me a lot.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 May 2021 05:12:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-workstations-to-join-domain-controller/m-p/409971#M92520</guid>
      <dc:creator>FoxOnTheRun</dc:creator>
      <dc:date>2021-05-29T05:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: Allow workstations to join domain controller</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-workstations-to-join-domain-controller/m-p/409980#M92522</link>
      <description>&lt;P&gt;Cool.... &amp;nbsp;FYI... you can set the built-in inter/intra policies at the bottom of your ruleset to log session start but will log absolutely everything so thats why i prefer to be more specific with zone to zone info or source/dest ip... And sorry for teaching egg sucking but always make sure this goes pretty much as the last policy when your ruleset starts to increase...&lt;/P&gt;</description>
      <pubDate>Sat, 29 May 2021 06:34:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-workstations-to-join-domain-controller/m-p/409980#M92522</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-05-29T06:34:14Z</dc:date>
    </item>
  </channel>
</rss>

