<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Personal VPN Services thwarting Company Policies in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558159#M113209</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20702"&gt;@Jaragorn&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;So if you were using GlobalProtect to limit access to NetScaler instead of publishing directly, you could build out HIP checks to ensure that another VPN adapter isn't active on the host to limit that activity. Doesn't sound like you're enforcing GlobalProtect to gain access to NetScaler, so you don't have the HIP check option that would be available to you with an agent.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think you're left with building automation to identify commercial VPN services being utilized and then blocking identified addresses so that they can't connect anymore. I'd recommend using an EDL so you aren't needing to commit to activate address changes, and then you could either block the EDL as a whole or just to NetScaler so they can't use your Citrix environment when connected to a VPN.&lt;/P&gt;
&lt;P&gt;The automation that I would build would look something like this:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Build out a report for any addresses accessing your Citrix environment (to make it most effective, ensure that log-start is enabled instead of just log-end).&lt;/LI&gt;
&lt;LI&gt;Query that report through the XML API so that you can grab the source addresses that are connecting.&lt;/LI&gt;
&lt;LI&gt;Define a way to identify VPN resources based off of the hostname or WHOIS information available. In this example you could search for&amp;nbsp;VPN-Consumer-US as an example. Determine whether you're going to attempt to block just the address, or if you'd rather try and block the IP range returned in the WHOIS record.&lt;/LI&gt;
&lt;LI&gt;Feed identified addresses into your EDL source so that the firewall can poll them at whatever schedule you have set as a refresh interval.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Most of my clients who go through the process of identifying things at this level have a policy that their users are not to use consumer VPN services and must only work while in the United States. Of those, the vast majority aren't allowing BYOD endpoints to connect at all which means you'd just use endpoint policy to block access to consumer VPN applications.&lt;/P&gt;
&lt;P&gt;In the event that BYOD is actually allowed and they identify this behavior we have the above script running to identify someone breaking policy, and we'll block the source address or range associated with the VPN. The bigger aspect however is not an IT or security aspect, but rather that the employee has violated corporate policy. The vast majority of these institutions have the script disable the account and all associated access as a security response, and the rest of it is handled by their respective HR departments.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 15 Sep 2023 17:08:52 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2023-09-15T17:08:52Z</dc:date>
    <item>
      <title>Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/557964#M113176</link>
      <description>&lt;P&gt;Downstream of our PAN's, we have our Citrix environment.&amp;nbsp; This environment includes some Netscalers that have a nice feature in that they provide in their SYSLOG, two fields named "ClientIP" and "NATIP".&amp;nbsp; &amp;nbsp;This proves quite useful in that while the ClientIP field geolocates to a local Boston IP address, the NATIP address shows they are coming in from, for example, Spain.&amp;nbsp; &amp;nbsp;While we have rules in our PAN that should prevent these non-US connections, the VPN services apparently use a local proxy that thwarts the PAN's location lookup.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've searched and can't seem to find if the PAN's can present and utilize something equivalent to the Netscaler's NATIP so as to be able to leverage it in a policy rule or not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: I have the TOR rules setup but these connections are not TOR.&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 14:50:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/557964#M113176</guid>
      <dc:creator>Jaragorn</dc:creator>
      <dc:date>2023-09-14T14:50:03Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/557983#M113180</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Is this inbound or outbound traffic? Also what application does the PAN see it as? Do you have ssl decryption enabled?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 17:55:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/557983#M113180</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-09-14T17:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/557986#M113182</link>
      <description>&lt;P&gt;The traffic of concern is inbound traffic that is properly identified as SSL and DTLS without decryption.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 18:22:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/557986#M113182</guid>
      <dc:creator>Jaragorn</dc:creator>
      <dc:date>2023-09-14T18:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/557997#M113184</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;So in the detailed log view when looking at one of the completed sessions, the IP listed is the US based one?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_0-1694718024225.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53732i1D42EA8AF10B9E41/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_0-1694718024225.png" alt="OtakarKlier_0-1694718024225.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 19:00:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/557997#M113184</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-09-14T19:00:31Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/557998#M113185</link>
      <description>&lt;P&gt;Sorry should have been the 'Source' not destination.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 19:02:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/557998#M113185</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-09-14T19:02:00Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558146#M113206</link>
      <description>&lt;P&gt;Correct, the source shows as US by virtue of the VPN service the user employs.&amp;nbsp; Looking up the source IP shows it belonging to NordVPN.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 16:12:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558146#M113206</guid>
      <dc:creator>Jaragorn</dc:creator>
      <dc:date>2023-09-15T16:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558149#M113207</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20702"&gt;@Jaragorn&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Do these users need to connect to GlobalProtect prior to accessing anything in your environment? Is that what you're attempting to limit to the US that these users are using commercial VPN solutions to bypass that restriction?&lt;/P&gt;
&lt;P&gt;Or are we talking about simply being able to access another public resource behind your PAN that you limit to US addresses?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 16:26:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558149#M113207</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-09-15T16:26:45Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558151#M113208</link>
      <description>&lt;P&gt;In my case the Citrix Netscaler captures (top image) the source IP (ClientIP) and NatIP,&amp;nbsp; but the PAN doesn't identify the NatIP the same as the Netscaler does for the same session.&amp;nbsp; In this case, an ExpressVPN VPN session.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Jaragorn_1-1694794736210.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53762i4A51BA3A0894A3E1/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Jaragorn_1-1694794736210.png" alt="Jaragorn_1-1694794736210.png" /&gt;&lt;/span&gt;&amp;nbsp;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Jaragorn_0-1694794665657.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53761i0690028618B97293/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Jaragorn_0-1694794665657.png" alt="Jaragorn_0-1694794665657.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In every case in which the Netscaler records a session with a different ClientIP/NatIP, they turn out to be a commercial VPN service sessions.&amp;nbsp; Perhaps if I decrypted the traffic it may pick up the commercial VPN service, but I don't believe it's a best practice for Citrix traffic.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 16:32:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558151#M113208</guid>
      <dc:creator>Jaragorn</dc:creator>
      <dc:date>2023-09-15T16:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558159#M113209</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20702"&gt;@Jaragorn&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;So if you were using GlobalProtect to limit access to NetScaler instead of publishing directly, you could build out HIP checks to ensure that another VPN adapter isn't active on the host to limit that activity. Doesn't sound like you're enforcing GlobalProtect to gain access to NetScaler, so you don't have the HIP check option that would be available to you with an agent.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think you're left with building automation to identify commercial VPN services being utilized and then blocking identified addresses so that they can't connect anymore. I'd recommend using an EDL so you aren't needing to commit to activate address changes, and then you could either block the EDL as a whole or just to NetScaler so they can't use your Citrix environment when connected to a VPN.&lt;/P&gt;
&lt;P&gt;The automation that I would build would look something like this:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Build out a report for any addresses accessing your Citrix environment (to make it most effective, ensure that log-start is enabled instead of just log-end).&lt;/LI&gt;
&lt;LI&gt;Query that report through the XML API so that you can grab the source addresses that are connecting.&lt;/LI&gt;
&lt;LI&gt;Define a way to identify VPN resources based off of the hostname or WHOIS information available. In this example you could search for&amp;nbsp;VPN-Consumer-US as an example. Determine whether you're going to attempt to block just the address, or if you'd rather try and block the IP range returned in the WHOIS record.&lt;/LI&gt;
&lt;LI&gt;Feed identified addresses into your EDL source so that the firewall can poll them at whatever schedule you have set as a refresh interval.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Most of my clients who go through the process of identifying things at this level have a policy that their users are not to use consumer VPN services and must only work while in the United States. Of those, the vast majority aren't allowing BYOD endpoints to connect at all which means you'd just use endpoint policy to block access to consumer VPN applications.&lt;/P&gt;
&lt;P&gt;In the event that BYOD is actually allowed and they identify this behavior we have the above script running to identify someone breaking policy, and we'll block the source address or range associated with the VPN. The bigger aspect however is not an IT or security aspect, but rather that the employee has violated corporate policy. The vast majority of these institutions have the script disable the account and all associated access as a security response, and the rest of it is handled by their respective HR departments.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 17:08:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558159#M113209</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-09-15T17:08:52Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558179#M113211</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Another solution which I'm sure has already been discussed is to have users VPN into the environment prior to utilizing the Citrix environment. I'm sure there is a lot of pushback with this, however its easier to control the internal environment rather than exposing something directly to the internet, per se.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 19:57:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558179#M113211</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-09-15T19:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558369#M113259</link>
      <description>&lt;P&gt;Hello BPry, we use GlobalProtect for VPN access to the C suite only, all others access Citrix, which also sits behind the PAN and uses Duo to perform MFA on the netscalers.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 13:24:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558369#M113259</guid>
      <dc:creator>Jaragorn</dc:creator>
      <dc:date>2023-09-18T13:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558394#M113268</link>
      <description>&lt;P&gt;Hello BPry, there is pushback on having user use GP to access Citrix but the more info I have to make a case the better.&amp;nbsp; &amp;nbsp;The idea of using HIP checks to check for active adapter sessions seems like it would be helpful but I couldn't find anything on it when I last looked at it, and I don't see anything about networking on the GP -&amp;gt; HIP Objects tab (registry setting?).&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any info you have on that topic would be appreciated!&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 15:44:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558394#M113268</guid>
      <dc:creator>Jaragorn</dc:creator>
      <dc:date>2023-09-18T15:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558396#M113269</link>
      <description>&lt;P&gt;Completely agree, but you're correct about the pushback.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 16:08:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558396#M113269</guid>
      <dc:creator>Jaragorn</dc:creator>
      <dc:date>2023-09-18T16:08:09Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558644#M113320</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;On the HIP checks, look for stuff that is specific to your environment. Might be tough since they are company machines etc. Another think I always recommend is to use the built-in EDL's to create a security poly to drop the traffic. Along with a Zone Protection profile. However not a guarantee this will work. Not sure if anyone out there is tracking these types of sites, however you could have SIEM alert to something like, alert if users are connecting from the same IP. The find out who owns the IP's and block the entire ASN subnet? Its whack-a-mole, but people might give up after a while?&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 20:43:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558644#M113320</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-09-19T20:43:31Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558647#M113321</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Had another idea, not Palo Alto and there is a cost. Use a secure DNS service and have the agent installed on all machines. Something like OpenDNS. This way when they try to go to one of those sites, its blocked but OpenDNS. This would also help when users do not want to connect to the VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another option could be to use 'Always-on' vpn. THis way the users may not need to enter additional credentials, but they are one the VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just some random thoughts.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 21:06:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558647#M113321</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-09-19T21:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558648#M113322</link>
      <description>&lt;DIV class="lia-inline-reply-author"&gt;&lt;FONT color="#666666"&gt;&lt;SPAN&gt;Hello OtakarKlier, I've looked into the use of EDL's but the total number of IP addresses the PAN can support from EDL's is far short of the number of US VPN endpoints currently known.&amp;nbsp; &amp;nbsp;Given this I have two options:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;UL&gt;
&lt;LI class="lia-inline-reply-author"&gt;&lt;FONT color="#666666"&gt;&lt;SPAN&gt;create a web server that can lookup IP addresses accessing our Citrix environment against a list of known VPN endpoints (yes, there are services that maintain a list of known worldwide&amp;nbsp;VPN endpoints), and add matches found to a EDL.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI class="lia-inline-reply-author"&gt;&lt;FONT color="#666666"&gt;&lt;SPAN&gt;Or, figure out how to get the PAN to show the real NATIP as shown above.&amp;nbsp; A rule that would test&amp;nbsp; Where SOURCEIP&amp;nbsp; &amp;lt;&amp;gt; NATIP -&amp;gt; DROP would be all it'd take.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;FONT color="#666666"&gt;&lt;SPAN&gt;I don't know why a Netscaler can see the real NATIP and a PAN cannot.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#666666"&gt;&lt;SPAN&gt;Still looking for the answer.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#666666"&gt;&lt;SPAN&gt;Thanks for kicking this around with me!&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;DIV id="messageEditor_285f4a75f33f13_0" class="MessageEditor"&gt;
&lt;DIV class="lia-js-block-events"&gt;
&lt;DIV class="lia-form-row lia-form-body-entry"&gt;
&lt;DIV class="lia-quilt-row lia-quilt-row-standard"&gt;
&lt;DIV class="lia-quilt-column lia-quilt-column-24 lia-quilt-column-single"&gt;
&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-single"&gt;
&lt;DIV class="lia-form-input-wrapper"&gt;
&lt;DIV id="rich_285f4a75f33f13_3f4fe" class="message-body-editor lia-inline-message-body-editor"&gt;
&lt;DIV id="mceu_91" class="mce-tinymce mce-container mce-panel lia-editor-gte-2" tabindex="-1" role="application"&gt;
&lt;DIV id="mceu_91-body" class="mce-container-body mce-stack-layout"&gt;
&lt;DIV id="mceu_92" class="mce-top-part mce-container mce-stack-layout-item mce-first"&gt;
&lt;DIV id="mceu_92-body" class="mce-container-body"&gt;
&lt;DIV id="mceu_93" class="mce-toolbar-grp mce-container mce-panel mce-first mce-last" tabindex="-1" role="group"&gt;
&lt;DIV id="mceu_93-body" class="mce-container-body mce-stack-layout"&gt;
&lt;DIV id="mceu_94" class="mce-container mce-toolbar mce-stack-layout-item mce-first" role="toolbar"&gt;
&lt;DIV id="mceu_94-body" class="mce-container-body mce-flow-layout"&gt;
&lt;DIV id="mceu_95" class="mce-container mce-flow-layout-item mce-first mce-last mce-btn-group" role="group"&gt;
&lt;DIV id="mceu_95-body"&gt;
&lt;DIV id="mceu_52" class="mce-widget mce-btn mce-btn-small mce-first" tabindex="-1" role="button" aria-label="Undo" aria-disabled="false"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="mceu_53" class="mce-widget mce-btn mce-btn-small lia-mce-toolbar-bold" tabindex="-1" role="button" aria-pressed="false" aria-label="Bold"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 19 Sep 2023 21:09:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558648#M113322</guid>
      <dc:creator>Jaragorn</dc:creator>
      <dc:date>2023-09-19T21:09:09Z</dc:date>
    </item>
    <item>
      <title>Re: Personal VPN Services thwarting Company Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558649#M113323</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I think this is a real scenario that others are facing as well. I reached out to a SE I know really well and he suggested the following:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networking-features/web-proxy" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networking-features/web-proxy&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Not sure of the code version or hardware you are running however.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 21:16:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/personal-vpn-services-thwarting-company-policies/m-p/558649#M113323</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-09-19T21:16:23Z</dc:date>
    </item>
  </channel>
</rss>

