<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: adding x-forward-for client IP to HTTP header in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/521851#M108125</link>
    <description>&lt;P&gt;Sorry for this bump, but another use-case are cloud deployments with active-active firewalls, which require a source-nat to keep the traffic symmetric. A variable like ($srcip) instead of ($user) would be helpful and eliminate the need of a proxy like the Azure AppGW in front of the FWs for this functionality.&lt;/P&gt;</description>
    <pubDate>Mon, 21 Nov 2022 09:53:42 GMT</pubDate>
    <dc:creator>robmaas</dc:creator>
    <dc:date>2022-11-21T09:53:42Z</dc:date>
    <item>
      <title>adding x-forward-for client IP to HTTP header</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/284469#M76310</link>
      <description>&lt;P&gt;Does the PA support the ability to populate the x-forward-for field?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 21:42:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/284469#M76310</guid>
      <dc:creator>skidoohead</dc:creator>
      <dc:date>2019-08-21T21:42:50Z</dc:date>
    </item>
    <item>
      <title>Re: adding x-forward-for client IP to HTTP header</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/284489#M76311</link>
      <description>&lt;P&gt;Yes, this is supported with customers who have a PANW-DB URL license.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Objects&amp;nbsp; --&amp;gt; Security Profiles --&amp;gt; URL --&amp;gt;&amp;nbsp; URL Filtering Settings&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClViCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClViCAK&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 00:04:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/284489#M76311</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-08-22T00:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: adding x-forward-for client IP to HTTP header</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/391132#M90751</link>
      <description>&lt;P&gt;From what I read in the provided article the Palo Alto needs to have a proxy device before it for the XFF to be used ? I need the Palo Alto create HTTP&amp;nbsp; x-forward-for (XFF) header as the Palo Alto is only proxy device and it is used as a Forwarding SSL outbound proxy for a small branch office. Is this possible?&lt;/P&gt;</description>
      <pubDate>Sun, 14 Mar 2021 12:48:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/391132#M90751</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2021-03-14T12:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: adding x-forward-for client IP to HTTP header</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/391346#M90768</link>
      <description>&lt;P&gt;Pretty sure that's not possible. The PA can use the XFF entry but can't insert it.&lt;/P&gt;&lt;P&gt;Why do you need the PA to insert XFF?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Mar 2021 22:04:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/391346#M90768</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2021-03-15T22:04:11Z</dc:date>
    </item>
    <item>
      <title>Re: adding x-forward-for client IP to HTTP header</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/391666#M90797</link>
      <description>&lt;P&gt;As mentioned the Palo Alto is also used as a forwarding web Proxy (SSL Outbound Inspection) for a small site. It also does NAT for the outbound traffic and some servers in HQ want to see the original client IP address. For me it seems normal to be able to do this on a firewall that also acts as a forwarding web Proxy.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Mar 2021 07:48:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/391666#M90797</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2021-03-17T07:48:14Z</dc:date>
    </item>
    <item>
      <title>Re: adding x-forward-for client IP to HTTP header</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/391824#M90807</link>
      <description>&lt;P&gt;Do you have your browsers configured to use the proxy settings and point them at the PA? If so, I wasn't aware they could do this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as I know, the forward proxy is really meant as SSL decrypt when browsing. Traditional web proxy features like caching aren't available on the PA.&lt;/P&gt;&lt;P&gt;Is your HQ accessed over the internet or a private connection like a VPN tunnel?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Mar 2021 17:31:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/391824#M90807</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2021-03-17T17:31:45Z</dc:date>
    </item>
    <item>
      <title>Re: adding x-forward-for client IP to HTTP header</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/392450#M90896</link>
      <description>&lt;P&gt;The palo alto can be used as transperant ssl proxy with ssl redirect captive portal &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJYCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJYCA0&lt;/A&gt; . I don't get why there is no option to instert a header with the client IP address variable, similar to &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-new-features/user-id-features/include-username-in-http-header-insertion-entries.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-new-features/user-id-features/include-username-in-http-header-insertion-entries.html&lt;/A&gt; , I hope that this will be added as it is a simple option and in some cases needed. Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Mar 2021 13:58:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/392450#M90896</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2021-03-20T13:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: adding x-forward-for client IP to HTTP header</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/521851#M108125</link>
      <description>&lt;P&gt;Sorry for this bump, but another use-case are cloud deployments with active-active firewalls, which require a source-nat to keep the traffic symmetric. A variable like ($srcip) instead of ($user) would be helpful and eliminate the need of a proxy like the Azure AppGW in front of the FWs for this functionality.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2022 09:53:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/521851#M108125</guid>
      <dc:creator>robmaas</dc:creator>
      <dc:date>2022-11-21T09:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: adding x-forward-for client IP to HTTP header</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/522036#M108161</link>
      <description>&lt;P&gt;Also now in version 11 Palo Alto NGFW is going full explicit/transparent proxy mode, so being able to insert XFF not only read it seems like something Palo Alto needs to think about.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networking-features/web-proxy" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networking-features/web-proxy&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 13:13:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-x-forward-for-client-ip-to-http-header/m-p/522036#M108161</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2022-11-22T13:13:46Z</dc:date>
    </item>
  </channel>
</rss>

