<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Terminal server from a single IP address, the firewall cannot distinguish which user generated which traffic! in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/terminal-server-from-a-single-ip-address-the-firewall-cannot/m-p/1237951#M6291</link>
    <description>&lt;P&gt;When multiple users access a terminal server from a single IP address, the firewall cannot distinguish which user generated which traffic. The firewall maps the IP address to only one user.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After research, I resolved this issue with TSA, but I wanted to know if it's possible to determine which user actually owned the traffic from the past, before TSA was installed!&lt;/P&gt;</description>
    <pubDate>Mon, 15 Sep 2025 07:02:25 GMT</pubDate>
    <dc:creator>Joao_Carvalho</dc:creator>
    <dc:date>2025-09-15T07:02:25Z</dc:date>
    <item>
      <title>Terminal server from a single IP address, the firewall cannot distinguish which user generated which traffic!</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/terminal-server-from-a-single-ip-address-the-firewall-cannot/m-p/1237951#M6291</link>
      <description>&lt;P&gt;When multiple users access a terminal server from a single IP address, the firewall cannot distinguish which user generated which traffic. The firewall maps the IP address to only one user.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After research, I resolved this issue with TSA, but I wanted to know if it's possible to determine which user actually owned the traffic from the past, before TSA was installed!&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 07:02:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/terminal-server-from-a-single-ip-address-the-firewall-cannot/m-p/1237951#M6291</guid>
      <dc:creator>Joao_Carvalho</dc:creator>
      <dc:date>2025-09-15T07:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal server from a single IP address, the firewall cannot distinguish which user generated which traffic!</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/terminal-server-from-a-single-ip-address-the-firewall-cannot/m-p/1237966#M6292</link>
      <description>&lt;P&gt;No you can't get historical data.&lt;/P&gt;
&lt;P&gt;If you install TSA then every user will get block of source ports.&lt;/P&gt;
&lt;P&gt;Outgoing traffic from specific user will be sourced from port range assigned to that user.&lt;/P&gt;
&lt;P&gt;TSA hands over source block range to user mapping over to Palo that can then identify user based on what source port traffic came from.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you don't have such source port mapping before TSA was installed you can't segregate user traffic from before TSA install.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 12:22:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/terminal-server-from-a-single-ip-address-the-firewall-cannot/m-p/1237966#M6292</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-09-15T12:22:06Z</dc:date>
    </item>
  </channel>
</rss>

