<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic X-Forwarded-For (XFF) operation query in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/x-forwarded-for-xff-operation-query/m-p/567188#M114584</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We are evaluating the implementation of X-Forwarded-For (XFF) functionality for logs.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/identify-users-connected-through-a-proxy-server/use-xff-values-for-ip-based-security-policy-and-logging" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/identify-users-connected-through-a-proxy-server/use-xff-values-for-ip-based-security-policy-and-logging &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;However, this functionality was activated and affected the traffic, denying traffic that should be allowed and that contained the XFF header.&lt;/P&gt;
&lt;P&gt;In case the feature is enabled, if the traffic contains the XFF header, - How is the traffic policy evaluated, and is the source IPv4 address no longer taken into account and replaced in the evaluation by the IPv4 address of the XFF header? - Is there any mechanism to verify the authenticity of who wrote the XFF header?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks so much&lt;/P&gt;</description>
    <pubDate>Mon, 27 Nov 2023 12:13:05 GMT</pubDate>
    <dc:creator>Alpalo</dc:creator>
    <dc:date>2023-11-27T12:13:05Z</dc:date>
    <item>
      <title>X-Forwarded-For (XFF) operation query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/x-forwarded-for-xff-operation-query/m-p/567188#M114584</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We are evaluating the implementation of X-Forwarded-For (XFF) functionality for logs.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/identify-users-connected-through-a-proxy-server/use-xff-values-for-ip-based-security-policy-and-logging" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/identify-users-connected-through-a-proxy-server/use-xff-values-for-ip-based-security-policy-and-logging &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;However, this functionality was activated and affected the traffic, denying traffic that should be allowed and that contained the XFF header.&lt;/P&gt;
&lt;P&gt;In case the feature is enabled, if the traffic contains the XFF header, - How is the traffic policy evaluated, and is the source IPv4 address no longer taken into account and replaced in the evaluation by the IPv4 address of the XFF header? - Is there any mechanism to verify the authenticity of who wrote the XFF header?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks so much&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 12:13:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/x-forwarded-for-xff-operation-query/m-p/567188#M114584</guid>
      <dc:creator>Alpalo</dc:creator>
      <dc:date>2023-11-27T12:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: X-Forwarded-For (XFF) operation query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/x-forwarded-for-xff-operation-query/m-p/567220#M114589</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192671"&gt;@Alpalo&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As described here - &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-new-features/policy-features/xff-header-support-for-security-policy" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-new-features/policy-features/xff-header-support-for-security-policy&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Since 10.0 PAN will use XFF source IP to enforce security policy. &lt;BR /&gt;&lt;BR /&gt;Q: How is the traffic policy evaluated, and is the source IPv4 address no longer taken into account and replaced in the evaluation by the IPv4 address of the XFF header?&lt;BR /&gt;A: Correct. Security policy will evaluated based on the source IP from the XFF and not the source IP from the network packet header.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Q: Is there any mechanism to verify the authenticity of who wrote the XFF header?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A: I don't there is a way. Due to the nature of the HTTP headers, you can slap there anything you want, the same way you can forged the user agent.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 14:26:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/x-forwarded-for-xff-operation-query/m-p/567220#M114589</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-11-27T14:26:12Z</dc:date>
    </item>
  </channel>
</rss>

