<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Using XFF Headers with VM-Series on GCP in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/using-xff-headers-with-vm-series-on-gcp/ta-p/572621</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Organizations often use Google Cloud’s &lt;/SPAN&gt;&lt;A href="https://cloud.google.com/load-balancing/docs/application-load-balancer" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Application Load Balancer&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; to distribute HTTP/HTTPS traffic to VM-Series firewalls deployed within Google Cloud.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Diagram 1" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56424i5B025A8FDF5FC506/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="diagram1.png" alt="Diagram 1" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Diagram 1&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this setup, the Application Load Balancer functions as a proxy, altering the client's source address before forwarding the request to the VM-Series for security inspection. This may present challenges for organizations defining security policies based on the client's address or requiring IP preservation for backend applications protected by the VM-Series.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&lt;SPAN&gt;Using XFF Headers with PAN-OS&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Within PAN-OS, the firewalls can be configured to use the source address of an X-Forwarded-For (XFF) header to enforce security policy.&amp;nbsp; When configured, the firewall applies policy based on the address that was most-recently added to the XFF field.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;However, when using the Application Load Balancer, this approach alone will not work.&amp;nbsp; This is because the load balancer appends two addresses to the XFF header, where the &lt;CODE&gt;&amp;lt;load-balancer-ip&amp;gt;&lt;/CODE&gt; is the most-recent address within the header and the &lt;CODE&gt;&amp;lt;client-ip&amp;gt;&lt;/CODE&gt; is the next-to-last address.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;X-Forwarded-For: &amp;lt;client-ip&amp;gt;, &amp;lt;load-balancer-ip&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Solution&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Within the backend service configuration of the Application Load Balancer, you can define custom headers to make the client address the most-recently added address to the XFF field. When used, the load balancer preserves the supplied value of the custom header before the &lt;CODE&gt;&amp;lt;client-ip&amp;gt;, &amp;lt;load-balancer-ip&amp;gt;&lt;/CODE&gt; addresses.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;X-Forwarded-For: &amp;lt;supplied-value&amp;gt;, &amp;lt;client-ip&amp;gt;, &amp;lt;load-balancer-ip&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To insert the client’s address as the supplied value, you can use the &lt;CODE&gt;client_ip_address&lt;/CODE&gt; header variable.&amp;nbsp; This variable contains the client’s IP address, and has the same value as the &lt;CODE&gt;&amp;lt;client-ip&amp;gt;&lt;/CODE&gt; address.&amp;nbsp; Once configured, the VM-Series can then use the client’s address to enforce policy.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Diagram 2" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56425iBDA86DCE443492F3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="diagram2.png" alt="Diagram 2" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Diagram 2&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H2&gt;Steps to Implement&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;The steps below outline how to add the &lt;CODE&gt;client_ip_address&lt;/CODE&gt; value as a custom header to an existing Application Load Balancer that uses the VM-Series as its backend service.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H4&gt;&lt;SPAN&gt;Adding Custom Request Header to Backend Service&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;1. In Google Cloud, go to &lt;STRONG&gt;Network Services → Load Balancing&lt;/STRONG&gt;.&amp;nbsp; Select your Application Load Balancer and click&amp;nbsp;&lt;STRONG&gt;Edit&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2. Select &lt;STRONG&gt;Backend Configuration&amp;nbsp;&lt;/STRONG&gt;and click the edit icon next to the backend service.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Selecting backend" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56419i3916C1A75006CBDD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image1.png" alt="Selecting backend" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Selecting backend&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3. Under&amp;nbsp;&lt;STRONG&gt;Advance Configurations&amp;nbsp;→ Custom Request Headers&lt;/STRONG&gt;, click&amp;nbsp;&lt;STRONG&gt;Add Header&lt;/STRONG&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;4. Set the header name to &lt;CODE&gt;X-Forwarded-For&lt;/CODE&gt; and the header value to &lt;CODE&gt;{client_ip_address}&lt;/CODE&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Adding customer header" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56420i3B3B85DFEA1D3310/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="image2.png" alt="Adding customer header" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Adding customer header&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;5. Click&amp;nbsp;&lt;STRONG&gt;Update&lt;/STRONG&gt; to apply the changes.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Configure VM-Series for XFF Headers&lt;/H4&gt;
&lt;P&gt;1. On the VM-Series, go to&amp;nbsp;&lt;STRONG&gt;Device → Setup&amp;nbsp;→ Content-ID&amp;nbsp;→ X-Forwarded-For Headers&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Set&amp;nbsp;&lt;STRONG&gt;Use X-Forwarded-For Header&lt;/STRONG&gt; to&amp;nbsp;&lt;CODE&gt;Enabled for Security Policy&lt;/CODE&gt;.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Enabling XFF for policy." style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56421iE6F2E5202BB30CB3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image3.png" alt="Enabling XFF for policy." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Enabling XFF for policy.&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. Commit the changes.&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;View Traffic Logs&lt;/H4&gt;
&lt;P&gt;Once the changes have been applied, you can view the value of the &lt;CODE&gt;client_ip_address&lt;/CODE&gt; header within the firewall's traffic logs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Simulate traffic flows through the Application Load Balancer to your application.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Go to&amp;nbsp;&lt;STRONG&gt;Monitor&amp;nbsp;→ Traffic&amp;nbsp;&lt;/STRONG&gt;and add the&amp;nbsp;&lt;STRONG&gt;X-Forwarded-For IP&lt;/STRONG&gt; field to the log view.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Log viewer." style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56422iA0812F68BDEB046A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image4.png" alt="Log viewer." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Log viewer.&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The traffic logs should now contain the client's IP address under the&amp;nbsp;&lt;STRONG&gt;X-Forwarded-For IP&lt;/STRONG&gt; column.&amp;nbsp; This address can then be used as the source address within the VM-Series security policies.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Traffic logs" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56426iEAE55B1601B6E0BB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image5.png" alt="Traffic logs" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Traffic logs&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jan 2024 00:27:58 GMT</pubDate>
    <dc:creator>mmclimans</dc:creator>
    <dc:date>2024-01-11T00:27:58Z</dc:date>
    <item>
      <title>Using XFF Headers with VM-Series on GCP</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/using-xff-headers-with-vm-series-on-gcp/ta-p/572621</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Organizations often use Google Cloud’s &lt;/SPAN&gt;&lt;A href="https://cloud.google.com/load-balancing/docs/application-load-balancer" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Application Load Balancer&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; to distribute HTTP/HTTPS traffic to VM-Series firewalls deployed within Google Cloud.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Diagram 1" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56424i5B025A8FDF5FC506/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="diagram1.png" alt="Diagram 1" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Diagram 1&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this setup, the Application Load Balancer functions as a proxy, altering the client's source address before forwarding the request to the VM-Series for security inspection. This may present challenges for organizations defining security policies based on the client's address or requiring IP preservation for backend applications protected by the VM-Series.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&lt;SPAN&gt;Using XFF Headers with PAN-OS&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Within PAN-OS, the firewalls can be configured to use the source address of an X-Forwarded-For (XFF) header to enforce security policy.&amp;nbsp; When configured, the firewall applies policy based on the address that was most-recently added to the XFF field.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;However, when using the Application Load Balancer, this approach alone will not work.&amp;nbsp; This is because the load balancer appends two addresses to the XFF header, where the &lt;CODE&gt;&amp;lt;load-balancer-ip&amp;gt;&lt;/CODE&gt; is the most-recent address within the header and the &lt;CODE&gt;&amp;lt;client-ip&amp;gt;&lt;/CODE&gt; is the next-to-last address.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;X-Forwarded-For: &amp;lt;client-ip&amp;gt;, &amp;lt;load-balancer-ip&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Solution&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Within the backend service configuration of the Application Load Balancer, you can define custom headers to make the client address the most-recently added address to the XFF field. When used, the load balancer preserves the supplied value of the custom header before the &lt;CODE&gt;&amp;lt;client-ip&amp;gt;, &amp;lt;load-balancer-ip&amp;gt;&lt;/CODE&gt; addresses.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;X-Forwarded-For: &amp;lt;supplied-value&amp;gt;, &amp;lt;client-ip&amp;gt;, &amp;lt;load-balancer-ip&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To insert the client’s address as the supplied value, you can use the &lt;CODE&gt;client_ip_address&lt;/CODE&gt; header variable.&amp;nbsp; This variable contains the client’s IP address, and has the same value as the &lt;CODE&gt;&amp;lt;client-ip&amp;gt;&lt;/CODE&gt; address.&amp;nbsp; Once configured, the VM-Series can then use the client’s address to enforce policy.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Diagram 2" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56425iBDA86DCE443492F3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="diagram2.png" alt="Diagram 2" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Diagram 2&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H2&gt;Steps to Implement&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;The steps below outline how to add the &lt;CODE&gt;client_ip_address&lt;/CODE&gt; value as a custom header to an existing Application Load Balancer that uses the VM-Series as its backend service.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H4&gt;&lt;SPAN&gt;Adding Custom Request Header to Backend Service&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;1. In Google Cloud, go to &lt;STRONG&gt;Network Services → Load Balancing&lt;/STRONG&gt;.&amp;nbsp; Select your Application Load Balancer and click&amp;nbsp;&lt;STRONG&gt;Edit&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2. Select &lt;STRONG&gt;Backend Configuration&amp;nbsp;&lt;/STRONG&gt;and click the edit icon next to the backend service.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Selecting backend" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56419i3916C1A75006CBDD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image1.png" alt="Selecting backend" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Selecting backend&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3. Under&amp;nbsp;&lt;STRONG&gt;Advance Configurations&amp;nbsp;→ Custom Request Headers&lt;/STRONG&gt;, click&amp;nbsp;&lt;STRONG&gt;Add Header&lt;/STRONG&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;4. Set the header name to &lt;CODE&gt;X-Forwarded-For&lt;/CODE&gt; and the header value to &lt;CODE&gt;{client_ip_address}&lt;/CODE&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Adding customer header" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56420i3B3B85DFEA1D3310/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="image2.png" alt="Adding customer header" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Adding customer header&lt;/span&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;5. Click&amp;nbsp;&lt;STRONG&gt;Update&lt;/STRONG&gt; to apply the changes.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Configure VM-Series for XFF Headers&lt;/H4&gt;
&lt;P&gt;1. On the VM-Series, go to&amp;nbsp;&lt;STRONG&gt;Device → Setup&amp;nbsp;→ Content-ID&amp;nbsp;→ X-Forwarded-For Headers&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Set&amp;nbsp;&lt;STRONG&gt;Use X-Forwarded-For Header&lt;/STRONG&gt; to&amp;nbsp;&lt;CODE&gt;Enabled for Security Policy&lt;/CODE&gt;.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Enabling XFF for policy." style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56421iE6F2E5202BB30CB3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image3.png" alt="Enabling XFF for policy." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Enabling XFF for policy.&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. Commit the changes.&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;View Traffic Logs&lt;/H4&gt;
&lt;P&gt;Once the changes have been applied, you can view the value of the &lt;CODE&gt;client_ip_address&lt;/CODE&gt; header within the firewall's traffic logs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Simulate traffic flows through the Application Load Balancer to your application.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Go to&amp;nbsp;&lt;STRONG&gt;Monitor&amp;nbsp;→ Traffic&amp;nbsp;&lt;/STRONG&gt;and add the&amp;nbsp;&lt;STRONG&gt;X-Forwarded-For IP&lt;/STRONG&gt; field to the log view.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Log viewer." style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56422iA0812F68BDEB046A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image4.png" alt="Log viewer." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Log viewer.&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The traffic logs should now contain the client's IP address under the&amp;nbsp;&lt;STRONG&gt;X-Forwarded-For IP&lt;/STRONG&gt; column.&amp;nbsp; This address can then be used as the source address within the VM-Series security policies.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Traffic logs" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56426iEAE55B1601B6E0BB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image5.png" alt="Traffic logs" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Traffic logs&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 00:27:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/using-xff-headers-with-vm-series-on-gcp/ta-p/572621</guid>
      <dc:creator>mmclimans</dc:creator>
      <dc:date>2024-01-11T00:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: Using XFF Headers with VM-Series on GCP</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/using-xff-headers-with-vm-series-on-gcp/tac-p/595606#M744</link>
      <description>&lt;P&gt;Hi mmclimans,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;We have applied the setting which you have mentioned in the article, still we are unable to see the X-Forwarded-For IP entry in traffic logs.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;In our environment we have applied SSL certificate on External &amp;amp; Internal Application Load Balancers or in PA we are performing Inbound SSL Inspection.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;How we can resolve the issue ?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 09:16:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/using-xff-headers-with-vm-series-on-gcp/tac-p/595606#M744</guid>
      <dc:creator>Mitesh_Nandu</dc:creator>
      <dc:date>2024-08-22T09:16:58Z</dc:date>
    </item>
  </channel>
</rss>

