<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Student extensive use of VPNs. in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/student-extensive-use-of-vpns/m-p/566733#M2066</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so if the users are applying VPN's why dont you create a rule for lets say 'zone class B' that is not allow to do traffic the traffic that you saw?&lt;BR /&gt;do the rule based on layer 4 tcp/udp port number&lt;/P&gt;</description>
    <pubDate>Wed, 22 Nov 2023 16:49:42 GMT</pubDate>
    <dc:creator>Major2375</dc:creator>
    <dc:date>2023-11-22T16:49:42Z</dc:date>
    <item>
      <title>Student extensive use of VPNs.</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/student-extensive-use-of-vpns/m-p/523987#M1806</link>
      <description>&lt;P&gt;Hello Livecommunity. We are in a bind. We have numerous students on our school networks that are bypassing security profile rules with VPNs. So frustrating. I do have rulesets that look for annnomizers and proxies. I also have explicit rules that look for categories such as Facebook, Snapchat, etc... Not sure what to do. I worry that the more rules I setup in the firewall, the more work it has to do and gets sluggish? Am I right? I did see something about disabling 'QUIC" which I can but want this firewall to be optimized and working very well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any suggestions (even mean ones) appreciated.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jean-Claude&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 17:56:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/student-extensive-use-of-vpns/m-p/523987#M1806</guid>
      <dc:creator>JCMoritz</dc:creator>
      <dc:date>2022-12-13T17:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: Student extensive use of VPNs.</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/student-extensive-use-of-vpns/m-p/523989#M1807</link>
      <description>&lt;P&gt;Firewall don't see into QUIC traffic so it is best practice to block it.&lt;/P&gt;
&lt;P&gt;Block URL category proxy-avoidance-and-anonymizers&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition create application filter for subcategory "encrypted-tunnel" (Objects &amp;gt; Application Filters) and block it for students.&lt;/P&gt;
&lt;P&gt;Place this block rule after you have permitted outgoing SSL application.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 18:06:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/student-extensive-use-of-vpns/m-p/523989#M1807</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2022-12-13T18:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: Student extensive use of VPNs.</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/student-extensive-use-of-vpns/m-p/523990#M1808</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;@Radio_Rattameister, will try tonight.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 18:13:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/student-extensive-use-of-vpns/m-p/523990#M1808</guid>
      <dc:creator>JCMoritz</dc:creator>
      <dc:date>2022-12-13T18:13:51Z</dc:date>
    </item>
    <item>
      <title>Re: Student extensive use of VPNs.</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/student-extensive-use-of-vpns/m-p/566562#M2064</link>
      <description>&lt;P&gt;I hope you found a solution to the problem.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 21:23:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/student-extensive-use-of-vpns/m-p/566562#M2064</guid>
      <dc:creator>StephenPrevost</dc:creator>
      <dc:date>2023-11-21T21:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: Student extensive use of VPNs.</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/student-extensive-use-of-vpns/m-p/566733#M2066</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so if the users are applying VPN's why dont you create a rule for lets say 'zone class B' that is not allow to do traffic the traffic that you saw?&lt;BR /&gt;do the rule based on layer 4 tcp/udp port number&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 16:49:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/student-extensive-use-of-vpns/m-p/566733#M2066</guid>
      <dc:creator>Major2375</dc:creator>
      <dc:date>2023-11-22T16:49:42Z</dc:date>
    </item>
  </channel>
</rss>

