<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block malicious domains at interface level in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/block-malicious-domains-at-interface-level/m-p/432407#M95739</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167254"&gt;@Vijaygvasan&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If you don't want this traffic to be processed by the firewall, you would need to drop it before it reaches your firewall. If you have that requirement then that traffic should be dropped immediately by your first controlled network resource, so in most cases a router.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 07 Sep 2021 17:35:06 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2021-09-07T17:35:06Z</dc:date>
    <item>
      <title>Block malicious domains at interface level</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-malicious-domains-at-interface-level/m-p/432248#M95192</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a concern where is there any way to block malicious domain based or malicious ip based traffic ingress through the firewall to trust zone or dmz zone from untrust zone to be blocked at interface level even before it reaches to pbf or policy or processing over firewall.&lt;/P&gt;&lt;P&gt;Is there any way to block malicious domain before it is being processed. Let me know the possibilities.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 12:57:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-malicious-domains-at-interface-level/m-p/432248#M95192</guid>
      <dc:creator>Vijaygvasan</dc:creator>
      <dc:date>2021-09-07T12:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: Block malicious domains at interface level</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-malicious-domains-at-interface-level/m-p/432407#M95739</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167254"&gt;@Vijaygvasan&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If you don't want this traffic to be processed by the firewall, you would need to drop it before it reaches your firewall. If you have that requirement then that traffic should be dropped immediately by your first controlled network resource, so in most cases a router.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 17:35:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-malicious-domains-at-interface-level/m-p/432407#M95739</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-09-07T17:35:06Z</dc:date>
    </item>
    <item>
      <title>Re: Block malicious domains at interface level</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-malicious-domains-at-interface-level/m-p/432476#M95746</link>
      <description>&lt;P&gt;So firewall cannot drop a packet at isp interface level am i right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 03:35:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-malicious-domains-at-interface-level/m-p/432476#M95746</guid>
      <dc:creator>Vijaygvasan</dc:creator>
      <dc:date>2021-09-08T03:35:46Z</dc:date>
    </item>
  </channel>
</rss>

