- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
10-05-2021 01:57 PM - edited 10-05-2021 02:08 PM
Experience/feedback with VLAN insertion design for East-West traffic segregation
We are planning to leverage the VLAN insertion design for achieving micro segmentation in out OT network.
just thought of checking within the Live community team for any feedback, caveats based on your experience with similar implemetation. Thank you.
https://www.paloaltonetworks.com/resources/whitepapers/applying-vlan-insertion-in-ics-scada
10-05-2021 02:19 PM
Hello,
On some devices, I started with something like the following:
Source Zone: trust, Source User: AD group that has access, Destination, Zone and IP address of scada/device, enable threat prevention and disable url filtering.
With this I can limit the traffic to those who have access and then watch and see what applications if any are being discovered, then tune from there.
The other thing I have seen is that some PAN models is that the amount of zones is limited. So I created a zone called something like IOT, and then set policies of source and destination IP's/subnets. Since I have a DENY ALL policy as my last rule, the intra zone traffic is blocked.
Hope that helps a bit.
10-05-2021 05:29 PM
thank you for your reply. I agree with your comment on the Zone dependency per FW hardware.
Based on your experience, any comment on the below items:
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!