<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Forward Proxy Configuration Question in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/ssl-forward-proxy-configuration-question/m-p/566474#M2037</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;just so I understand correctly, are you hosting the site internally? in this case you would need to set up ssl inbound inspection instead of forward proxy&lt;/P&gt;
&lt;P&gt;the source would be untrust any, the destination would be the public IP thats pointing to your FQDN&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the destination zone is determined by the routing table post nat, so if for example your public IP is NATed to 10.0.0.1, the routing table will be checked to see where the packet needs to be routed (either to a connected network or a next hop internal router) and then that zone is used&lt;/P&gt;</description>
    <pubDate>Tue, 21 Nov 2023 11:59:15 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2023-11-21T11:59:15Z</dc:date>
    <item>
      <title>SSL Forward Proxy Configuration Question</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/ssl-forward-proxy-configuration-question/m-p/566449#M2036</link>
      <description>&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Trying to get SSL Forward Proxy configured for one of my sites and had a quick question around the configuration. For the certificate I need to put the IP address for the trust side of open flame-grilled. The problem is I am not sure which Interface IP address to use validation code...&amp;nbsp;&lt;A href="https://mybkexperience.cafe/" target="_self"&gt;MYBKExperience&lt;/A&gt;&lt;/P&gt;
&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;All of my internal subnets and VLANs have internal gateway IPs for subinterfaces that are trunked over from the core switch the Monthly sweepstakes. Each subnet has its own gateway IP for the VLAN and then at the routing level the traffic&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is forwarded out to the ISP next hop. The exit interface out to the ISP is configured for the public IP assignment from the ISP.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 05:16:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/ssl-forward-proxy-configuration-question/m-p/566449#M2036</guid>
      <dc:creator>davidadley</dc:creator>
      <dc:date>2023-11-22T05:16:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Forward Proxy Configuration Question</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/ssl-forward-proxy-configuration-question/m-p/566474#M2037</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;just so I understand correctly, are you hosting the site internally? in this case you would need to set up ssl inbound inspection instead of forward proxy&lt;/P&gt;
&lt;P&gt;the source would be untrust any, the destination would be the public IP thats pointing to your FQDN&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the destination zone is determined by the routing table post nat, so if for example your public IP is NATed to 10.0.0.1, the routing table will be checked to see where the packet needs to be routed (either to a connected network or a next hop internal router) and then that zone is used&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 11:59:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/ssl-forward-proxy-configuration-question/m-p/566474#M2037</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-11-21T11:59:15Z</dc:date>
    </item>
  </channel>
</rss>

