<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Experience/feedback with VLAN insertion design for East-West traffic segregation in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/experience-feedback-with-vlan-insertion-design-for-east-west/m-p/438981#M99495</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;On some devices, I started with something like the following:&lt;/P&gt;&lt;P&gt;Source Zone: trust, Source User: AD group that has access, Destination, Zone and IP address of scada/device, enable threat prevention and disable url filtering.&lt;/P&gt;&lt;P&gt;With this I can limit the traffic to those who have access and then watch and see what applications if any are being discovered, then tune from there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other thing I have seen is that some PAN models is that the amount of zones is limited. So I created a zone called something like IOT, and then set policies of source and destination IP's/subnets. Since I have a DENY ALL policy as my last rule, the intra zone traffic is blocked.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps a bit.&lt;/P&gt;</description>
    <pubDate>Tue, 05 Oct 2021 21:19:10 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2021-10-05T21:19:10Z</dc:date>
    <item>
      <title>Experience/feedback with VLAN insertion design for East-West traffic segregation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/experience-feedback-with-vlan-insertion-design-for-east-west/m-p/438966#M99494</link>
      <description>&lt;P&gt;Experience/feedback with VLAN insertion design for East-West traffic segregation&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are planning to leverage the VLAN insertion design for achieving micro segmentation in out OT network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;just thought of checking within the Live community team for any feedback, caveats&amp;nbsp; based on your experience with similar implemetation. Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/resources/whitepapers/applying-vlan-insertion-in-ics-scada" target="_blank" rel="noopener"&gt;https://www.paloaltonetworks.com/resources/whitepapers/applying-vlan-insertion-in-ics-scada&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PratheeshP_0-1633468112522.jpeg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36841iAE3C3AAFBD797AFB/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="PratheeshP_0-1633468112522.jpeg" alt="PratheeshP_0-1633468112522.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 21:08:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/experience-feedback-with-vlan-insertion-design-for-east-west/m-p/438966#M99494</guid>
      <dc:creator>PratheeshP</dc:creator>
      <dc:date>2021-10-05T21:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: Experience/feedback with VLAN insertion design for East-West traffic segregation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/experience-feedback-with-vlan-insertion-design-for-east-west/m-p/438981#M99495</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;On some devices, I started with something like the following:&lt;/P&gt;&lt;P&gt;Source Zone: trust, Source User: AD group that has access, Destination, Zone and IP address of scada/device, enable threat prevention and disable url filtering.&lt;/P&gt;&lt;P&gt;With this I can limit the traffic to those who have access and then watch and see what applications if any are being discovered, then tune from there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other thing I have seen is that some PAN models is that the amount of zones is limited. So I created a zone called something like IOT, and then set policies of source and destination IP's/subnets. Since I have a DENY ALL policy as my last rule, the intra zone traffic is blocked.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps a bit.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 21:19:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/experience-feedback-with-vlan-insertion-design-for-east-west/m-p/438981#M99495</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-10-05T21:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: Experience/feedback with VLAN insertion design for East-West traffic segregation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/experience-feedback-with-vlan-insertion-design-for-east-west/m-p/439015#M99501</link>
      <description>&lt;P&gt;thank you for your reply. I agree with your comment on the Zone dependency per FW hardware.&lt;/P&gt;&lt;P&gt;Based on your experience, any comment on the below items:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What will be the SVI for VLAN for Layer 3 communication to outside segments?&lt;UL&gt;&lt;LI&gt;I am planning to configure all my OT systems in the current segment to a dedicated VLAN per connected port, trunked to FW (VLAN insertion). Not sure how the SVI Gateway (Layer 3) will be required on the FW?&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;How broadcast and multi-cast will be handled?&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Wed, 06 Oct 2021 00:29:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/experience-feedback-with-vlan-insertion-design-for-east-west/m-p/439015#M99501</guid>
      <dc:creator>PratheeshP</dc:creator>
      <dc:date>2021-10-06T00:29:19Z</dc:date>
    </item>
  </channel>
</rss>

