- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Content translations are temporarily unavailable due to site maintenance. We apologize for any inconvenience. Visit our blog to learn more.
12-22-2017 06:45 AM
I am pretty new to the Palo Alto's so I have a questions that will be pretty easy to answer.
I am setting up a PA-820 in Virtual Wire and we have both Trusted and Untrusted networks on the same interface from the router. The External interface is the route to the internet but is also the route to all our branches through GRE Tunnels. What would be the best way to setup secuirty policies that protect against internet traffic but allow the 10.0.0.0 network.
12-22-2017 08:21 AM
Interesting. You won't be able to seperate them into logical zones then, since you can only put one zone on an interface.
I imagine that you would simply be more strict between source/destination addresses than someone who could simply specify a zone, and that you'll likely use a pretty fair amount of the negate option. Any policy that you make for protecting against outside connections you could negate the 10.0.0.0/8 network so that those policies simply wouldn't apply to anything within that range.
01-02-2018 06:55 AM
Are your GRE tunnels going through some WAN connection or concentrator?
If your environment is on managed switches you could set the internet to one VLAN and your GRE output to another, then create tagged sub-interfaces for your vwire. Each sub-interface can have it's own zone, so you'd be able to do just that (then bridge the vlans behind your vwire)
You could also switch to a layer2 layout and have the firewall act as a switch rather than a router or a tube. You'd be able to put each of your 3 areas in a layer2 zone and bridge them all and apply security policies between the zones
If your GRE tunnels are terminated behind the firewall on the inside (it's not clear where you are terminating the tunnels) you can simply allow GRE from untrust to trust and/or trust to untrust
otherwise @BPry's solution is the way to go: differentiate between anything with 10.0.0.0 negated, or specifically for source/destination 10.0.0.0
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!