Hey there.
To brief, Palo alto is not a deny all firewall. It has 2 default actions:
Interzone deny and Intrazone allow.
This indicates that all traffic passing between zones will be denied unless explicitly allowed.
The explicit rule has to be on top of these as the rules are evaluated from Top down.
Hence, its a restrictive access device. However, how you will come to know if anyone was allowed or denied using default rule.
By default it is not going to log anything. Yes, no logging at all. I think this should be allowed by default. Before version 6.1 there were no such rules but they were present implicitly. You just couldn't see them. If you need to enabled logs you had to mimic these two rules and enabled logging.
After 7.0 if we need to enable logging, we would have to override and change settings. We can't change their name and nature but it will allow you to make minimal changes. Here are few captures.
To brief, Palo alto is not a deny all firewall. It has 2 default actions:
Interzone deny and Intrazone allow.
This indicates that all traffic passing between zones will be denied unless explicitly allowed.
The explicit rule has to be on top of these as the rules are evaluated from Top down.
Hence, its a restrictive access device. However, how you will come to know if anyone was allowed or denied using default rule.
By default it is not going to log anything. Yes, no logging at all. I think this should be allowed by default. Before version 6.1 there were no such rules but they were present implicitly. You just couldn't see them. If you need to enabled logs you had to mimic these two rules and enabled logging.
After 7.0 if we need to enable logging, we would have to override and change settings. We can't change their name and nature but it will allow you to make minimal changes. Here are few captures.
