<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restrict Individual Administrators by Interface or IP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/1240918#M125438</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you for reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I completely agree with you. In my post, I was replacing inaccessible link (DOC-8042) with a new link for KB and not referring it as a solution to original post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Oct 2025 22:16:57 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2025-10-29T22:16:57Z</dc:date>
    <item>
      <title>Restrict Individual Administrators by Interface or IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/31259#M22848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a way to restrict access for specific administrators by interface or IP address? I really thought I'd seen this somewhere, but now I cannot find it in GUI or docs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Quick explanation of what we want to do. We want to have a sort of backdoor, emergency access to the firewalls directly from the Internet. That is, should some catastrophic network event (big misconfiguration or failure of the firewalls themselves, the core network, or remote access devices) break our usual ability to log in via remote access VPN and come into the firewalls' management interfaces, we want to be able to connect directly into the firewalls from the Internet. These firewalls are in a data center, so it's at least a half-hour car ride even during business hours, plus we want our off-site managed services provider to also have this ability.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually, we use AD-backed authentication for administrators on the internal network. However, in the event of a failure, the AD servers may not be reachable, plus from a security point of view, using simple username-password authentication does not seem secure enough to face the Internet, even with source IP address restrictions. We would want to have a more secure local authentication method. Luckily, using public-key-based authentication (SSH keys and HTTPS client certs) are both options for local administrator authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, those local accounts would seem to work out fine, but how do we block regular AD-based authentication from the Internet and allow it for the special local accounts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Mar 2015 22:16:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/31259#M22848</guid>
      <dc:creator>cosx</dc:creator>
      <dc:date>2015-03-26T22:16:54Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Individual Administrators by Interface or IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/31260#M22849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you are looking to configure permitted IP address, that would restrict only those users to access the public interface of the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can refer the below document:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-8042"&gt;Allowing Specific IP Addresses to Access the Palo Alto Network Device&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would have to add the permitted IP addresses in the management profile (Network -&amp;gt;interface management).&lt;/P&gt;&lt;P&gt;Then call this profile in the interface (Network -&amp;gt;interface-&amp;gt;advanced) settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By doing so, you would be allowing access just to those users associated with the IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ramya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Mar 2015 23:03:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/31260#M22849</guid>
      <dc:creator>rrajendran</dc:creator>
      <dc:date>2015-03-26T23:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Individual Administrators by Interface or IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/31261#M22850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Cosx,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can enable HTTPS and SSH on the public facing interface i.e. the untrust interface and specify the permitted ip-address as mentioned in below link.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-8042"&gt;Allowing Specific IP Addresses to Access the Palo Alto Network Device&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To have another layer of security you can also create a security policy from untrust zone to untrust zone and specify which ip-addresses are allowed as source and also mention the HTTPS and SSH application. This helps if you have the intra-zone policy as block i.e. untrust to untrust zone as block.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Nitesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Mar 2015 01:02:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/31261#M22850</guid>
      <dc:creator>nnayak2</dc:creator>
      <dc:date>2015-03-27T01:02:38Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Individual Administrators by Interface or IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/31262#M22851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I can limit source IP addresses at either the Interface Mangement level or within the Security Policy. But &lt;STRONG&gt;any&lt;/STRONG&gt; administrator will then be able to access from the allowed IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to restrict some IP addresses to only certain administrators. For example, the administrator "johndoe" can only access HTTPS or SSH management via the management interface and/or from 10.100.0.0/16. Another user, "joefailsafe," can get in over an Internet-facing interface from &amp;lt;some-public-internet&amp;gt;/29 addresses. Whether joefailsafe also has access via the management interface and internal IPs, I don't care. What I do &lt;STRONG&gt;not&lt;/STRONG&gt; want is for johndoe to be able to get in from the Internet at &amp;lt;some-public-internet&amp;gt;/29.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using the features mentioned in the two previous responses, there is no difference in accessibility for johndoe and joefailsafe. (Again, I'm not sure that there is a way to do this in PANOS. I&amp;nbsp; thought I had seen the feature somewhere, but now I'm pretty sure I must have imagined it or be confusing our firewalls with some other device/OS.)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Mar 2015 16:18:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/31262#M22851</guid>
      <dc:creator>cosx</dc:creator>
      <dc:date>2015-03-27T16:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Individual Administrators by Interface or IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/31263#M22852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. You can do this for a admin user from AD, as you can mention the source user as well as the source ip-address in the same security policy which I mentioned in my previous update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the requirements for it&lt;/P&gt;&lt;P&gt;- user identification needs to be enabled on untrust interface&lt;/P&gt;&lt;P&gt;- AD needs to have the mapping of public ip-address and the user so that firewall can poll that information and map it to the security policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There can be some drawbacks too:&lt;/P&gt;&lt;P&gt;- Firewall will try to talk to AD to resolve a name for any public ip-address coming on untrust interface.&lt;/P&gt;&lt;P&gt;This is will be a very high process intensive and can also have lot of system logs of failed attempts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Firewall might not map a local admin user and its ip-address for access to the firewall itself.&lt;/P&gt;&lt;P&gt;This can be a feature request which can be discussed with your account/sales team.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Mar 2015 17:09:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/31263#M22852</guid>
      <dc:creator>nnayak2</dc:creator>
      <dc:date>2015-03-27T17:09:30Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Individual Administrators by Interface or IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/1240869#M125426</link>
      <description>&lt;P&gt;I need to do this 10 years later from the original post; however, the link provided no longer exist.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can I get some support on this task, please?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 20:34:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/1240869#M125426</guid>
      <dc:creator>Warron_F</dc:creator>
      <dc:date>2025-10-28T20:34:42Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Individual Administrators by Interface or IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/1240873#M125427</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/264025"&gt;@Warron_F&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;although I do not know what content was in the original link, this KB:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClovCAC" target="_self"&gt;Allowing Specific IP Addresses to Access the Palo Alto Network Device&lt;/A&gt;&amp;nbsp;looks like having the same name and likely content as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2025 00:30:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/1240873#M125427</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2025-10-29T00:30:17Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Individual Administrators by Interface or IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/1240899#M125430</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt;&amp;nbsp;-- Unfortunately I don't think that link provides the details to accomplishing what's being asked, and really I don't think Palo can/ever had the ability to do what's being asked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What's being asked is to tie an authorized user ID to a defined IP source.&amp;nbsp; Meaning that you or I could be coming from the same IP but you're allowed and I'm not.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2025 12:34:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/1240899#M125430</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2025-10-29T12:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Individual Administrators by Interface or IP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/1240918#M125438</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you for reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I completely agree with you. In my post, I was replacing inaccessible link (DOC-8042) with a new link for KB and not referring it as a solution to original post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2025 22:16:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-individual-administrators-by-interface-or-ip/m-p/1240918#M125438</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2025-10-29T22:16:57Z</dc:date>
    </item>
  </channel>
</rss>

