<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Captive portal bypass in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22232#M16197</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's kind of an extra step but we set up a couple of User-ID agents to connect to our exchange servers. Even though our MAC users don't authenticate with AD they do pull email form exchange. They get mapped that way so they don't get captured by Captive Portal.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 May 2014 14:38:07 GMT</pubDate>
    <dc:creator>DJGilm</dc:creator>
    <dc:date>2014-05-20T14:38:07Z</dc:date>
    <item>
      <title>Captive portal bypass</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22226#M16191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone familiar with a way to bypass captive portal for non-browser-based applications? Doing some testing with an eval unit from Palo alto and have configured agentless DC monitoring and using captive portal auth for a fallback. If a user hasn't already authenticated to captive portal it is blocking apps that go over port 80/443 such as ms-update, yum, etc. Anyway to workaround this other than exemption by ip address or url category?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Feb 2014 21:32:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22226#M16191</guid>
      <dc:creator>ccscott</dc:creator>
      <dc:date>2014-02-20T21:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal bypass</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22227#M16192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The examples you mention here are recognized as applications in the Palo Alto world.&amp;nbsp; So you would just identify the list of approved applications and place that allow rule based on application before your captive portal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You don't need to know ip addresses or ports, PanOS will recognize them from the app-id selected.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Feb 2014 21:45:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22227#M16192</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-02-21T21:45:44Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal bypass</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22228#M16193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can write a rule for unknown users (inside policy source user - unknown)&lt;/P&gt;&lt;P&gt;so they can use the applications you want when they are not authenticated yet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Feb 2014 18:47:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22228#M16193</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-02-22T18:47:38Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal bypass</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22229#M16194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've done just that but am still having issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems the issue I'm having with ms-update is related to the fact that part of the sessions are not identified as ms-update but instead ssl (seems to be just one of them)&lt;/P&gt;&lt;P&gt;&amp;nbsp; Out of the box yum works pretty well it seems but when extra repo's are configured on the linux machine it is not identified as yum.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can verified that this traffic is being affected by captive portal because as soon as I disable the captive portal policy it works correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems like windows doens't like the self-signed cert or redirect it sees when it hits cp. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 20:01:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22229#M16194</guid>
      <dc:creator>ccscott</dc:creator>
      <dc:date>2014-02-24T20:01:22Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal bypass</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22230#M16195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Howdy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Is this traffic coming from specific workstations/servers/devices?&amp;nbsp; Also, are these 'sources' being "ignored" for the purpose of Captive Portal? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Also, can these applications be run under "Service Accounts" that could then be handled using specific rules fo these specific service accounts?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 22:37:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22230#M16195</guid>
      <dc:creator>Art</dc:creator>
      <dc:date>2014-02-24T22:37:05Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal bypass</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22231#M16196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have no problem creating a no captive portal policy for certain servers and workstations. But we have quite a few macs that are not on the windows domain and the ones that are are not logging their ip/username combination for the firewall to learn from AD. Most windows users should be doing this through wsus server anyway. But the main issue is that the application identification is not working well enough for these apps to permit them through unless ssl/other application is also enabled for any user through basically a permit any any policy at the bottom of the rule base. This kind of goes against the postive enforcement approach that Palo Alto encourages. In fact it is much easier to block an app as you basically have to only break one part of it whereas you mush be able to identify and enable all flows/traffic with the postive enforcement approach.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm very impressed with PA firewalls in general. We use then in a few spots in our network already and are moving to them for our main enterprise firewall (I'm testing all of this on a test PA=5050 unit by the way). I have an SE working with me on this and if I were on a supported unit would just submit a ticket with support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Feb 2014 14:58:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22231#M16196</guid>
      <dc:creator>ccscott</dc:creator>
      <dc:date>2014-02-27T14:58:15Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal bypass</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22232#M16197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's kind of an extra step but we set up a couple of User-ID agents to connect to our exchange servers. Even though our MAC users don't authenticate with AD they do pull email form exchange. They get mapped that way so they don't get captured by Captive Portal.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 May 2014 14:38:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22232#M16197</guid>
      <dc:creator>DJGilm</dc:creator>
      <dc:date>2014-05-20T14:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal bypass</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22233#M16198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would also recommend using Global Protect agent in internal mode to identify users immediatly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 May 2014 21:03:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-bypass/m-p/22233#M16198</guid>
      <dc:creator>cpainchaud</dc:creator>
      <dc:date>2014-05-20T21:03:02Z</dc:date>
    </item>
  </channel>
</rss>

