FW Outbound policy

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

FW Outbound policy

L2 Linker

Hi

What is the best practice policy outbound from the FW itself (i.e management )?

Allow any out? *.palotalto.com?

 

3 REPLIES 3

L5 Sessionator

Hello,

 

It depends on what your needs would be and how locked down you want to be. For example if you use Stata Logging Service (Cortex Data Lake) There are things like *.gpcloudservice.com and ocsp.godaddy.com needed. Personally I would just recommend doing it by app-id, for the Palo services that are various app-ids for the services and the documentation should list it. For example, here is Strata Logging Services: 

Claw4609_0-1713891749755.png

TCP Ports and FQDNs Required for Strata Logging Service (paloaltonetworks.com)

 

L3 Networker

Create a custom URL list with all the palo FQDNs they recommend, make sure you have service route configured correctly if using anything other than Mgmt. Then use all the palo app-id selections with application default. Watch the logs over a few day for any URLs its trying to hit that might be palo related. Also use policy optimizer to slim down your app usage and rid of any apps your policy isn't using. 

Cyber Elite
Cyber Elite

Hello,

Along with the above already mentioned, disable all content inspection and ssl decryption, etc.

 

Regards,

  • 746 Views
  • 3 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!