<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic dynamic access lists based on source IPs ? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-access-lists-based-on-source-ips/m-p/128332#M98566</link>
    <description>&lt;P&gt;MindeMeld or EDL (external dynamic&amp;nbsp;list) in general can whitelist Office 365 but only per destination. Is there a way do build &lt;STRONG&gt;dynamic access lists based on source IPs&lt;/STRONG&gt; ?&lt;/P&gt;</description>
    <pubDate>Wed, 23 Nov 2016 00:19:25 GMT</pubDate>
    <dc:creator>niuk</dc:creator>
    <dc:date>2016-11-23T00:19:25Z</dc:date>
    <item>
      <title>dynamic access lists based on source IPs ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-access-lists-based-on-source-ips/m-p/128332#M98566</link>
      <description>&lt;P&gt;MindeMeld or EDL (external dynamic&amp;nbsp;list) in general can whitelist Office 365 but only per destination. Is there a way do build &lt;STRONG&gt;dynamic access lists based on source IPs&lt;/STRONG&gt; ?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2016 00:19:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dynamic-access-lists-based-on-source-ips/m-p/128332#M98566</guid>
      <dc:creator>niuk</dc:creator>
      <dc:date>2016-11-23T00:19:25Z</dc:date>
    </item>
    <item>
      <title>Re: dynamic access lists based on source IPs ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-access-lists-based-on-source-ips/m-p/128426#M98567</link>
      <description>&lt;P&gt;I'm not the firewall admin, but my understanding is that once you build a list with MineMeld and bring it into the firewall, you can then apply that list in a policy rule however you want to. I know we have a list that we block in both directions - where the list matches source or destination - and another list that we actually use to add exceptions to the a rule. What I mean by exceptions is there is a 'allow' firewall rule that has the list as the destination with certain port criteria, then a 'block' rule immediately below it that with the same port criteria, destination of 'any' and set to block.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2016 12:50:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dynamic-access-lists-based-on-source-ips/m-p/128426#M98567</guid>
      <dc:creator>DanWoodruff</dc:creator>
      <dc:date>2016-11-23T12:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: dynamic access lists based on source IPs ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-access-lists-based-on-source-ips/m-p/128427#M98568</link>
      <description>&lt;P&gt;Right, I was confused by examples , all of them were showing dynamic lists in&amp;nbsp;destination field of the rule. I veirifed that I can do it in the source field too...cool&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2016 12:59:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dynamic-access-lists-based-on-source-ips/m-p/128427#M98568</guid>
      <dc:creator>niuk</dc:creator>
      <dc:date>2016-11-23T12:59:17Z</dc:date>
    </item>
  </channel>
</rss>

