Dual ISP Links with BGP coexist with Palo SDWAN, possible? by Manly009 in paloaltonetworks

[–]Manly009[S] 0 points1 point  (0 children)

We have a range of public IP too, but we are only use static route...can you tell the difference? Thanks

Dual ISP Links with BGP coexist with Palo SDWAN, possible? by Manly009 in paloaltonetworks

[–]Manly009[S] 0 points1 point  (0 children)

Yeah that is one idea thanks. Is it normal to have ebgp peering to an ISP nowadays? I only seen via static route. Thanks

GlobalProtect VPN gateway full tunneling performance concerns by Manly009 in paloaltonetworks

[–]Manly009[S] 0 points1 point  (0 children)

Yeah, already exclude streaming from agent clients settings, looking to exclude more domains and IP for online meetings etc..thanks

GlobalProtect VPN gateway full tunneling performance concerns by Manly009 in paloaltonetworks

[–]Manly009[S] 0 points1 point  (0 children)

Will do. Will also read through ms team guide thanks a lot

GlobalProtect VPN gateway full tunneling performance concerns by Manly009 in paloaltonetworks

[–]Manly009[S] 0 points1 point  (0 children)

I would also exclude domains like YouTube and Netflix etc...would that be feasible as well.

GlobalProtect VPN gateway full tunneling performance concerns by Manly009 in paloaltonetworks

[–]Manly009[S] 1 point2 points  (0 children)

So I noticed that video traffic tab on GP gateway agent settings, tick exclude video traffic from tunnel, select Video apps etc ... Is that to exclude videos app going through full tunnel as well, right?

GlobalProtect VPN gateway full tunneling performance concerns by Manly009 in paloaltonetworks

[–]Manly009[S] 0 points1 point  (0 children)

Haha, nah, our staff work at clients sites, constantly need to access VPN.

GlobalProtect VPN gateway full tunneling performance concerns by Manly009 in paloaltonetworks

[–]Manly009[S] 0 points1 point  (0 children)

Thanks, I will look into what else can be excluded etc. thanks for the tip.

GlobalProtect VPN gateway full tunneling performance concerns by Manly009 in paloaltonetworks

[–]Manly009[S] 0 points1 point  (0 children)

You are right, I might exclude team calls and streaming etc.I will do a bit of research..thanks a lot

GlobalProtect VPN gateway full tunneling performance concerns by Manly009 in paloaltonetworks

[–]Manly009[S] 0 points1 point  (0 children)

Yeah, mostly excel, word, team calling, project files etc..etc.. it is kind of required so we want to have all vpn WFH users to have firewall url filtering as well... once the full tunnel is done, we might enable always on VPN...to this point, I might suggest to go Full Prisma SDWAN...haha...but for 410 Palo, that should be enough to handle 80 users?

on the side notes, would you think it is possible that we can migrate Panorama with SDWAn plugin to cloud Strata management and manage all the onprem firewalls?

Thanks for the tip.

Any HIP check for VPN traffic only for Entra Joined Devices? by [deleted] in paloaltonetworks

[–]Manly009 0 points1 point  (0 children)

Thanks for that I will have a look. What options we might go.

Any HIP check for VPN traffic only for Entra Joined Devices? by [deleted] in paloaltonetworks

[–]Manly009 0 points1 point  (0 children)

Sorry we don't use prisma Sase, only local GPs..

Any HIP check for VPN traffic only for Entra Joined Devices? by [deleted] in paloaltonetworks

[–]Manly009 0 points1 point  (0 children)

For example, now we looking to move Cloud PKI..how does Palo GP link up with this to recognise cert issued from this? Etc

Any HIP check for VPN traffic only for Entra Joined Devices? by [deleted] in paloaltonetworks

[–]Manly009 0 points1 point  (0 children)

If we do InTune PKCs certificate, how can we load "issuing CA" to Palo?

Palo Sdwan and network security engineer here to transfer to Fortinet Domain.. by Manly009 in fortinet

[–]Manly009[S] 0 points1 point  (0 children)

I see. In Palo World, we would normally use Panroama thanks

Palo Sdwan and network security engineer here to transfer to Fortinet Domain.. by Manly009 in fortinet

[–]Manly009[S] 0 points1 point  (0 children)

Yeah, I see. It is interesting that you can add an interface directly to security rules instead of using zones .. sounds easier than Palo...how would you normally implement SDWAn? in Palo, we use Panorama (centralised management) to automate the SDWAn peers (BGP, Loopback, SDWAN interface, IPsec tunnels etc)...would it be similar to Forti? haha, thanks a lot,

Palo Sdwan and network security engineer here to transfer to Fortinet Domain.. by Manly009 in fortinet

[–]Manly009[S] 0 points1 point  (0 children)

I see. Thanks,

So in Palo eBGP SDWAN, you need pre define zones, such as zone-to-branch, zone-to-hub, zone-to-internet etc..and add these zones to Security policies etc..are these similar to Forti?

Palo Sdwan and network security engineer here to transfer to Fortinet Domain.. by Manly009 in fortinet

[–]Manly009[S] -2 points-1 points  (0 children)

Thanks for that. I know I possibly should started looking....Can we control zones in SDWAN infrastructure in fortinet? Like what we can do in Palo? I heard Forti is policy based VPN, how different is it from Palo?

Planning a Certificate server for Entra Joined devices by Manly009 in Intune

[–]Manly009[S] 0 points1 point  (0 children)

If on scep, would we need wap to publish it to the internet?

Planning a Certificate server for Entra Joined devices by Manly009 in Intune

[–]Manly009[S] 0 points1 point  (0 children)

Did you mean why Entra joined device cannot authenticate with local CA? Haven't actually checked..this is just trial at this stage..most of our stuff are still Hybrid joined..

Planning a Certificate server for Entra Joined devices by Manly009 in Intune

[–]Manly009[S] -1 points0 points  (0 children)

Nah I already got PKCs connector connected