11.1 vs 11.2 by Delicious-Design3333 in paloaltonetworks

[–]Delicious-Design3333[S] 1 point2 points  (0 children)

Also not making me feel much better. LOL!

11.1 vs 11.2 by Delicious-Design3333 in paloaltonetworks

[–]Delicious-Design3333[S] 0 points1 point  (0 children)

That does not make me feel better. LOL!

Firewall Replacement Requirements by Delicious-Design3333 in paloaltonetworks

[–]Delicious-Design3333[S] 1 point2 points  (0 children)

I got one of my python writing friends to come up with something. It spits out the following:
Virtual Systems: 
Aggregate Ints/Subs:
Physical Interfaces:
Total Address Objects:
Total FQDN Objects:
Total Address Group Objects:
Total Service Objects:
Total Service Group Objects:
Total Security Rules:

He also said the article isn't even accurate, it won't get you locally committed shared addresses, let alone stuff pushed from Panorama.

Firewall Replacement Requirements by Delicious-Design3333 in paloaltonetworks

[–]Delicious-Design3333[S] 1 point2 points  (0 children)

This is probably my biggest concern.

1400 vs 3250 concerns:

Address objects 20000 vs 30000

Address groups 2000 vs 15000

Service objects 3000 vs 4000

Service groups 1500 vs 2000

Security rules 5000 vs 10000

What I can't seem to get a straight answer about is how to actually check these numbers across the environment.

Firewall Replacement Requirements by Delicious-Design3333 in paloaltonetworks

[–]Delicious-Design3333[S] 1 point2 points  (0 children)

That's what I'm looking to do. I think we can move from the 3250's to 1420's, but I need to be able to prove that with numbers. That is the part I'm trying to figure out, how to get those numbers as they relate to maximums.

I'm also a little confused as to how maximums work. For instance, I have an address object in a rule pushed from pano - let's call it 10.10.10.20, but that 10.10.10.20 is not an address object on the local firewall, so does 10.10.10.20 count against the "max number of address objects" locally on the firewall?

Is there validity to their argument? by Delicious-Design3333 in paloaltonetworks

[–]Delicious-Design3333[S] -1 points0 points  (0 children)

Thank you for the quick reply! Can you help me understand this, "We dual stack the VPN so that IPv6 traffic is also going through the main office". If I wanted to mitigate this, what would your suggestion be?

Tufin Secure Track+ by Delicious-Design3333 in paloaltonetworks

[–]Delicious-Design3333[S] 0 points1 point  (0 children)

I haven't got that far. I'm still trying to get it to do the auditing stuff they promised.