<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how can we confirm if there is existing firewall rule or not in the policy by filtering by source and destination IP address and port numbers. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418418#M93666</link>
    <description>&lt;P&gt;perhaps a picture of you Mr Remo... ha ha..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here's one...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MickBall_0-1625916091203.jpeg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34969iE0019CA9081F1423/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MickBall_0-1625916091203.jpeg" alt="MickBall_0-1625916091203.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;additional options...&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Tags&lt;/SPAN&gt;&lt;/STRONG&gt;: (tag/member eq 'tagname')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Name&lt;/SPAN&gt;&lt;/STRONG&gt;:&amp;nbsp;(name contains 'unlocate-block')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Type&lt;/SPAN&gt;&lt;/STRONG&gt;: (rule-type eq 'intrazone|interzone')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Source Zone&lt;/SPAN&gt;&lt;/STRONG&gt;: (from/member eq 'zonename')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Source Address&lt;/SPAN&gt;&lt;/STRONG&gt;: (source/member eq 'any|ip|object')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Source User&lt;/SPAN&gt;&lt;/STRONG&gt;: (source-user/member eq 'any|username|groupname')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Hip profile&lt;/SPAN&gt;&lt;/STRONG&gt;: &amp;nbsp;(hip-profiles/member eq 'any|profilename')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Destination Zone&lt;/SPAN&gt;&lt;/STRONG&gt;: (to/member eq 'zonename')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Destination Address&lt;/SPAN&gt;&lt;/STRONG&gt;: (destination/member eq 'any|ip|object')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Destination User&lt;/SPAN&gt;&lt;/STRONG&gt;: (destination-user/member eq 'any|username|groupname')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Application&lt;/SPAN&gt;&lt;/STRONG&gt;: (application/member eq 'any|applicationname|applicationgroup|applicationfilter')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Service&lt;/SPAN&gt;&lt;/STRONG&gt;: (service/member eq 'any|servicename|application-default')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;URL Category&lt;/SPAN&gt;&lt;/STRONG&gt;: (category/member eq 'any|categoryname')&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This is a destination category, not a URL filtering security profile&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Action&lt;/SPAN&gt;&lt;/STRONG&gt;: (action eq 'allow|drop|deny|reset-client|reset-server|reset-both')&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;stolen from here....&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/tips-and-tricks-filtering-the-security-policy/ba-p/163250" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/blogs/tips-and-tricks-filtering-the-security-policy/ba-p/163250&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and here is&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp; suggestion which gets my vote...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MickBall_1-1625916794556.jpeg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34970iFA52A37969185A2C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MickBall_1-1625916794556.jpeg" alt="MickBall_1-1625916794556.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 10 Jul 2021 11:33:36 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2021-07-10T11:33:36Z</dc:date>
    <item>
      <title>how can we confirm if there is existing firewall rule or not in the policy by filtering by source and destination IP address and port numbers.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418060#M93628</link>
      <description>&lt;P&gt;I can find existing firewall rule in the Firewall policy by searching by just source IP address or Just Destination IP address but our Firewall policy rule base is huge and i need to filter it by Source IP and destination IP address (both) and possibly by port number as well , (Just like Checkpoint).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can someone kindly share screenshot of this, that how we can do this in the Palo alto FW.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jul 2021 10:06:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418060#M93628</guid>
      <dc:creator>getjamshedkhan</dc:creator>
      <dc:date>2021-07-09T10:06:51Z</dc:date>
    </item>
    <item>
      <title>Re: how can we confirm if there is existing firewall rule or not in the policy by filtering by source and destination IP address and port numbers.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418125#M93635</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/74072"&gt;@getjamshedkhan&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So I'll actually do ya one better; the firewall actually has a built in function to test rulebase matches to ensure that traffic is actually going to match outside of just looking through the policies!&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are using the GUI and a newer PAN-OS release, you can use the 'Test Policy Match' on the bottom right of the policies tab view. This lets you to simulate traffic flows to ensure that you do/don't have a policy already that will match the traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-07-09 at 9.02.24 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34876i13F0EEC80F8CD2C6/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2021-07-09 at 9.02.24 AM.png" alt="Screen Shot 2021-07-09 at 9.02.24 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can also access this feature via the CLI if you aren't running one of the newer releases that exposes this feature in the GUI by building out the traffic flow with the&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;test&amp;nbsp;&lt;/EM&gt;&lt;I&gt;security-rulebase-match&amp;nbsp;&lt;/I&gt;&lt;/STRONG&gt;command.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jul 2021 14:08:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418125#M93635</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-07-09T14:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: how can we confirm if there is existing firewall rule or not in the policy by filtering by source and destination IP address and port numbers.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418318#M93652</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/74072"&gt;@getjamshedkhan&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just in case you are still interested in filtering the security policy based on multiple criteria. Actually this is possible. You can click on the drop down in the objects to add them to the filter or only to see the syntax to create a filter. For example for filtering based on a specific source object, destination object and service object you can use the following:&lt;/P&gt;&lt;P&gt;(source/member eq 'OBJECTNAME') and (destination/member eq 'OBJECTNAME') and (service/member eq 'SERVICEOBJECTNAME')&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jul 2021 19:13:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418318#M93652</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-07-09T19:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: how can we confirm if there is existing firewall rule or not in the policy by filtering by source and destination IP address and port numbers.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418365#M93657</link>
      <description>&lt;P&gt;@&lt;/P&gt;&lt;DIV class="lia-inline-reply-author"&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Cyber-Elite"&gt;&lt;SPAN class="lia-link-navigation lia-page-link lia-link-disabled lia-user-name-link"&gt;&lt;SPAN class="login-bold"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp; Thanks, Can you please share the picture of this filter.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="lia-inline-reply-author"&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Cyber-Elite"&gt;&lt;SPAN class="lia-link-navigation lia-page-link lia-link-disabled lia-user-name-link"&gt;&lt;SPAN class="login-bold"&gt;Thanks&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="MessageEditor"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418318#" target="_blank" rel="noopener"&gt;PREVIEW&lt;/A&gt;&lt;DIV class="lia-js-block-events"&gt;&lt;DIV class="lia-form-row lia-form-body-entry"&gt;&lt;DIV class="lia-quilt-row lia-quilt-row-standard"&gt;&lt;DIV class="lia-quilt-column lia-quilt-column-24 lia-quilt-column-single"&gt;&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-single"&gt;&lt;DIV class="lia-form-input-wrapper"&gt;&lt;DIV class="message-body-editor lia-inline-message-body-editor"&gt;&lt;DIV class="lia-inline-ajax-feedback"&gt;&lt;DIV class="AjaxFeedback"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="mce-tinymce mce-container mce-panel lia-editor-gte-2"&gt;&lt;DIV class="mce-container-body mce-stack-layout"&gt;&lt;DIV class="mce-top-part mce-container mce-stack-layout-item mce-first"&gt;&lt;DIV class="mce-container-body"&gt;&lt;DIV class="mce-toolbar-grp mce-container mce-panel mce-first mce-last"&gt;&lt;DIV class="mce-container-body mce-stack-layout"&gt;&lt;DIV class="mce-container mce-toolbar mce-stack-layout-item mce-first"&gt;&lt;DIV class="mce-container-body mce-flow-layout"&gt;&lt;DIV class="mce-container mce-flow-layout-item mce-first mce-last mce-btn-group"&gt;&lt;DIV&gt;&lt;DIV class="mce-widget mce-btn mce-btn-small lia-mce-toolbar-bold"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 09 Jul 2021 22:53:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418365#M93657</guid>
      <dc:creator>getjamshedkhan</dc:creator>
      <dc:date>2021-07-09T22:53:44Z</dc:date>
    </item>
    <item>
      <title>Re: how can we confirm if there is existing firewall rule or not in the policy by filtering by source and destination IP address and port numbers.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418402#M93663</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/74072"&gt;@getjamshedkhan&lt;/a&gt;&amp;nbsp;what picture would you like to see (as I provided the filter syntax already in the last comment)?&lt;/P&gt;</description>
      <pubDate>Sat, 10 Jul 2021 10:47:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418402#M93663</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-07-10T10:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: how can we confirm if there is existing firewall rule or not in the policy by filtering by source and destination IP address and port numbers.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418418#M93666</link>
      <description>&lt;P&gt;perhaps a picture of you Mr Remo... ha ha..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here's one...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MickBall_0-1625916091203.jpeg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34969iE0019CA9081F1423/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MickBall_0-1625916091203.jpeg" alt="MickBall_0-1625916091203.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;additional options...&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Tags&lt;/SPAN&gt;&lt;/STRONG&gt;: (tag/member eq 'tagname')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Name&lt;/SPAN&gt;&lt;/STRONG&gt;:&amp;nbsp;(name contains 'unlocate-block')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Type&lt;/SPAN&gt;&lt;/STRONG&gt;: (rule-type eq 'intrazone|interzone')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Source Zone&lt;/SPAN&gt;&lt;/STRONG&gt;: (from/member eq 'zonename')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Source Address&lt;/SPAN&gt;&lt;/STRONG&gt;: (source/member eq 'any|ip|object')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Source User&lt;/SPAN&gt;&lt;/STRONG&gt;: (source-user/member eq 'any|username|groupname')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Hip profile&lt;/SPAN&gt;&lt;/STRONG&gt;: &amp;nbsp;(hip-profiles/member eq 'any|profilename')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Destination Zone&lt;/SPAN&gt;&lt;/STRONG&gt;: (to/member eq 'zonename')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Destination Address&lt;/SPAN&gt;&lt;/STRONG&gt;: (destination/member eq 'any|ip|object')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Destination User&lt;/SPAN&gt;&lt;/STRONG&gt;: (destination-user/member eq 'any|username|groupname')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Application&lt;/SPAN&gt;&lt;/STRONG&gt;: (application/member eq 'any|applicationname|applicationgroup|applicationfilter')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Service&lt;/SPAN&gt;&lt;/STRONG&gt;: (service/member eq 'any|servicename|application-default')&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;URL Category&lt;/SPAN&gt;&lt;/STRONG&gt;: (category/member eq 'any|categoryname')&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This is a destination category, not a URL filtering security profile&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Action&lt;/SPAN&gt;&lt;/STRONG&gt;: (action eq 'allow|drop|deny|reset-client|reset-server|reset-both')&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;stolen from here....&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/tips-and-tricks-filtering-the-security-policy/ba-p/163250" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/blogs/tips-and-tricks-filtering-the-security-policy/ba-p/163250&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and here is&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp; suggestion which gets my vote...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MickBall_1-1625916794556.jpeg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34970iFA52A37969185A2C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MickBall_1-1625916794556.jpeg" alt="MickBall_1-1625916794556.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Jul 2021 11:33:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418418#M93666</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-07-10T11:33:36Z</dc:date>
    </item>
    <item>
      <title>Re: how can we confirm if there is existing firewall rule or not in the policy by filtering by source and destination IP address and port numbers.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418422#M93667</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;: D&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;(disabled eq 'yes') is missing in that list ... and also one for security profiles and logforwardingprofiles but this I don't know out of my head : P&lt;/P&gt;</description>
      <pubDate>Sat, 10 Jul 2021 12:19:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418422#M93667</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-07-10T12:19:25Z</dc:date>
    </item>
    <item>
      <title>Re: how can we confirm if there is existing firewall rule or not in the policy by filtering by source and destination IP address and port numbers.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418455#M93668</link>
      <description>&lt;P&gt;You can do this from the Policies Tab and then click on Security to show list of Security Policies configured. Then at the bottom right of this page you can see "Test Policy Match" button. By clicking on that you can search the policy as per your exact requirement.&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Test Security Policy Match.PNG" style="width: 770px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34972iF44C19C82E99CEA3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Test Security Policy Match.PNG" alt="Test Security Policy Match.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Jul 2021 12:26:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/418455#M93668</guid>
      <dc:creator>Shehriyar</dc:creator>
      <dc:date>2021-07-11T12:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: how can we confirm if there is existing firewall rule or not in the policy by filtering by source and destination IP address and port numbers.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/1248819#M126040</link>
      <description>&lt;P&gt;How can we verify the FQDN&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 00:52:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-can-we-confirm-if-there-is-existing-firewall-rule-or-not-in/m-p/1248819#M126040</guid>
      <dc:creator>cybertrontechnologies.ca</dc:creator>
      <dc:date>2026-02-24T00:52:20Z</dc:date>
    </item>
  </channel>
</rss>

