<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How can I detect and stop 3rd party VPN tools used to bypass my network security in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-i-detect-and-stop-3rd-party-vpn-tools-used-to-bypass-my/m-p/33550#M24618</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are a private high school with a growing laptop population but these kids work hard trying to circumvent our security.&amp;nbsp; They have found using 3rd party VPN tools, mostly single exe's they hide in their recucle bin when they fear exposure.&amp;nbsp; This tool comes with statements telling the user it is illegal and it will get them around the "best security systems your school has". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I detect and prevent this type of process from running on our network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 29 Apr 2013 17:11:24 GMT</pubDate>
    <dc:creator>MemphisBrothers</dc:creator>
    <dc:date>2013-04-29T17:11:24Z</dc:date>
    <item>
      <title>How can I detect and stop 3rd party VPN tools used to bypass my network security</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-i-detect-and-stop-3rd-party-vpn-tools-used-to-bypass-my/m-p/33550#M24618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are a private high school with a growing laptop population but these kids work hard trying to circumvent our security.&amp;nbsp; They have found using 3rd party VPN tools, mostly single exe's they hide in their recucle bin when they fear exposure.&amp;nbsp; This tool comes with statements telling the user it is illegal and it will get them around the "best security systems your school has". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I detect and prevent this type of process from running on our network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Apr 2013 17:11:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-can-i-detect-and-stop-3rd-party-vpn-tools-used-to-bypass-my/m-p/33550#M24618</guid>
      <dc:creator>MemphisBrothers</dc:creator>
      <dc:date>2013-04-29T17:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: How can I detect and stop 3rd party VPN tools used to bypass my network security</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-i-detect-and-stop-3rd-party-vpn-tools-used-to-bypass-my/m-p/33551#M24619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would check the traffic logs to see if any of these VPN or Proxy tools are already classified in the AppID database. If so, it's an easy block rule. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Apr 2013 17:52:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-can-i-detect-and-stop-3rd-party-vpn-tools-used-to-bypass-my/m-p/33551#M24619</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2013-04-29T17:52:19Z</dc:date>
    </item>
    <item>
      <title>Re: How can I detect and stop 3rd party VPN tools used to bypass my network security</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-i-detect-and-stop-3rd-party-vpn-tools-used-to-bypass-my/m-p/33552#M24620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PAN does have AppID signatures for most common ones like ultrasurf/TOR etc.You can start off by blocking some of the more common ones as 'umphmharding' mentioned (Some of these are SSL based so to make sure the signature works you may also have to configure SSL decryption). If the PA does not have signatures for some new application, it will show up as 'unknown-tcp/udp'. You can block 'unknown-tcp/udp' in the interim and then contact PA to have a signature created/updated for traffic that shows as 'unknown-tcp/udp'&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Apr 2013 18:03:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-can-i-detect-and-stop-3rd-party-vpn-tools-used-to-bypass-my/m-p/33552#M24620</guid>
      <dc:creator>goku123</dc:creator>
      <dc:date>2013-04-29T18:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: How can I detect and stop 3rd party VPN tools used to bypass my network security</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-can-i-detect-and-stop-3rd-party-vpn-tools-used-to-bypass-my/m-p/33553#M24621</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Another thing is to perform whitelisting and make that hole as narrow as possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Enable ssl-termination (not allowing traffic that cannot be terminated).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Blacklist appid's and app-groups you dont want to allow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Blacklist url-categories you dont want to allow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Whitelist appid's and app-groups you wish to allow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) Whitelist url-categories you wish to allow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6) Default deny and log on session end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using PANDB will most likely be more granular than the Brightcloud DB (that is not only domain but also part of the URI/URL aswell).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The blacklists should be as large/broad as possible while the whitelists should be as narrow as possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The point of placing whitelist AFTER blacklist is if you for example end up with a sitation such as: you wish to block www.example.com/badside but allow www.example.com in general.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since PA uses top-down first-match the url with www.example.com/badside would be blocked with above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you had whitelist first then the badside would have been allowed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Apr 2013 12:42:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-can-i-detect-and-stop-3rd-party-vpn-tools-used-to-bypass-my/m-p/33553#M24621</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-04-30T12:42:10Z</dc:date>
    </item>
  </channel>
</rss>

