- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
05-20-2014 02:34 PM
I have a highly regulated environment with multiple internal security zones. We need to be able to run our vulnerability scanning solution against servers in separate zones on a routine basis.
It was simple to exempt the scanner's IP from the Threat Prevention stuff (created a new security profile group which alerts on everything instead of blocking, and created a rule in the ACL to match against the scanner IP).
However, the vulnerability scanner is still prevented from completing its job because of zone protection (specifically, port scanning). I would hate to have to disable the zone protection rules or change them to alert EVERY time we wish to run a scan.
Any wonderful ideas?
05-20-2014 07:40 PM
There is a workaround to do this by creating and zone without any zone protection and use the IPs that you would like to be exempted as the loopback interface IP.
The steps required can be found here.
How to Exempt a Specific IP address from Zone Protection
https://live.paloaltonetworks.com/docs/DOC-3972
Hope this works for you.
Regards,
Narong
05-21-2014 01:34 PM
Thanks for you reply.
However it does not quite fit the scenario I am after. This seems like it would only work if you opened up one of your PUBLIC IPs. At that, it appears it would open up that public ip to port scanning from anywhere.
All devices in this scenario are internal. There is no NAT. The vulnerablity appliance is internal and has a static IP. We need to be able to scan devices in other "internal" zones.. and would like to open up port scanning from only the source vulnerability scanner.. and no other IPs.
05-21-2014 11:38 PM
In the example it shows that the external IP is the one that is being exempted. But instead of using the external IP subnet you can use the internal IP subnet as the loopback address.
11-21-2014 10:54 AM
We experienced a similar challenge and needed to allow our QSVs vulnerability scanners to bypass IDS/IPS and scan unobstructed for vulnerabilities. We achieved this by adding a Security Rule to allow the scanner IPs (no profiles) on TCP.
This eliminated the Scan Interference our QSV scanners were experiencing. This same approach should work internal-to-internal also.
12-02-2014 04:54 PM
This can still cause interference as port scans are blocked by the Zone Protection profile which is configured at the zone level and not via an ACL rule.
12-03-2014 06:49 AM
This was a suggested way to resolve the issue from PA support and it did resolve our specific scan interference issues, but I agree it may not be the end all be all.
12-03-2014 08:53 AM
I don't see a way to create an exception for one IP-Address or Subnet. The zone protection applies to the whole traffic in this zone. You could deactivate the zone protection and try to add a DoS Protection Rule which is configured like the zone protection.
01-30-2015 06:57 AM
Hello,
the link is no more accessable....Access to this place or content is restricted. If you think this is a mistake, please contact your administrator or the person who directed you here.
Can anyone provide the details or is there another solution ??
Regards
Michael
08-24-2015 03:25 PM
Echoing last comment as the mentioned DOC URI is gone. Get's old quick my vuln scanners throwing up thousands of alerts each week every time they do a scan across (or in within) the same/different zones.
08-26-2015 12:46 PM
All,
There is a feature request # 1910.
Whitelisting with Zone Protection (Reconnaissance). We have a handful of vulnerability scanners on campus use to scan our hosts and they are getting block by the zone protection profile. We are wondering if there is a feature request for providing a white list to not get block by the zone protection profile.
This FR has been open for at least 2 years. If you are interested, contact your sales person and sales engineer to add your company/name to the FR.
The Last update that I got was, it is been consider in PAN OS 8.0, no confirmation yet.
08-27-2015 02:28 PM
Hi all,
How about combining two zone protection profiles? One that is aggressive, for the Untrust zone, and one that is permissive for the Trust zone, that will allow your "friendly" IPs to scan. Than create GP gateway for friendly IPs, push them the route towards Trust / DMZ / whatever you are scanning, and sort them out in their own "scanners" zone. Once they start scanning only permissive profile from the Trust zone will be applied to their scans, allowing them to finish the job. They are coming from separate scanners zone thus esily circumventing aggressive blocking profile on the Untrust zone.
Regards
Luciano
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!