<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: A general web proxy server deployment with PAN box in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/a-general-web-proxy-server-deployment-with-pan-box/m-p/36654#M26954</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you really need to use a proxy at all?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just allow your clients direct access to the internet via the PA - simple. I assume everything will be PAT'd out via your firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This allows you to use the full features of the PA web monitoring function..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rod&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Jan 2013 14:24:35 GMT</pubDate>
    <dc:creator>djrodb</dc:creator>
    <dc:date>2013-01-22T14:24:35Z</dc:date>
    <item>
      <title>A general web proxy server deployment with PAN box</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-general-web-proxy-server-deployment-with-pan-box/m-p/36651#M26951</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All, &lt;/P&gt;&lt;P&gt;I think this topic has been discussed in the past, but I want to be clear about this deployment&lt;/P&gt;&lt;P&gt;since web proxy server design is still typical in many customer's live network. So please allow me to bring this again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 basic deployments are mentioned in the past. These deployments are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(1) Place PAN between users and a proxy server. It would be like, for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [Clients] -- [PAN] -- [Proxy] -- [Internet] &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (One of the recommended designs is placing a proxy server in a separate interface of PAN as a typical DMZ design.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; But, let's assume the above simple design. PA could be either L3 or vwire mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(2) Place PAN between a proxy server and internet. It would be like, for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [Client] -- [Proxy] -- [PAN] -- [Internet]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, my questions are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;&amp;lt; In case of (1) scenario &amp;gt;&amp;gt; &lt;/P&gt;&lt;P&gt;With this design, source web traffic comes from actual client and goes through PAN, so PAN can identify source user-id.&lt;/P&gt;&lt;P&gt;What about destination IP and app-id? Clients' web browser are actually pointing to the proxy server and the session to an external web server in Internet is&lt;/P&gt;&lt;P&gt;initiated from this web proxy server. Does that mean all destination IPs will be the IP address of this proxy server?&lt;/P&gt;&lt;P&gt;What about app-id to be identified? Will it be "web-proxy" for all traffic from clients?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;&amp;lt; In case of (2) scenario &amp;gt;&amp;gt;&lt;/P&gt;&lt;P&gt;From the past posts, the nature of this design can cause a problem, because all web access are coming from the web proxy server.&lt;/P&gt;&lt;P&gt;That means PAN can't identify original source IP addresses of clients.&lt;/P&gt;&lt;P&gt;The solution is enable "X-Forwarded-For" option in both web proxy server and PAN.&lt;/P&gt;&lt;P&gt;With "X-Forwarded-For" solution, PAN can identify original source IP address from clients since the original source IP is included in HTTP header.&lt;/P&gt;&lt;P&gt;My question is what about user-id? Can PAN map user-id based on this "X-Forwarded-For" feature, so that you can identify both original source IP and user-id?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any comment is appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tomimma&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jan 2013 19:35:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-general-web-proxy-server-deployment-with-pan-box/m-p/36651#M26951</guid>
      <dc:creator>tomimma</dc:creator>
      <dc:date>2013-01-21T19:35:56Z</dc:date>
    </item>
    <item>
      <title>Re: A general web proxy server deployment with PAN box</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-general-web-proxy-server-deployment-with-pan-box/m-p/36652#M26952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) Depends on how you setup your webproxy - if its transparent or non-transparent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When transparent your PAN will use dstip of the server on the Internet and just route its traffic to the proxy as nexthop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the request in transparent mode will be "GET / HTTP/1.0" or such.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case the client does the DNS-resolution aswell to find out which dstip the packets should use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When non-transparent the proxy waits for a CONNECT statement similar to "CONNECT &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.example.com/"&gt;http://www.example.com/&lt;/A&gt;&lt;SPAN&gt; HTTP/1.0" and then its the proxy who will do the DNS-resolution.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) I have a slight memory that the PA-device at least could handle those "X-Forwarded-For" in its logs - but I dunno if it will map those ip's with userid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you use this setup its a good thing to make sure your proxy will use "keepsource=yes", this way it doesnt matter if the webproxy is transparent or non-transparent towards the clients - it will be transparent towards the PA-device (since srcip will be kept when using keepsource=yes).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally I prefer the second design because the PA will then protect the proxy itself from the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way you can use this design:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) Client use proxysetting to use non-transparent proxy. This also brings us that in your internal network you will only see RFC1918 addresses (if you use them). This gives that if a non RFC1918 ip is seen it probably means that the client sending the packets have got a trojan/malware onboard (a trojan/malware that didnt pickup the proxy settings and instead tries to spread or monitor on its own).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*) Proxy is setup to non-transparent mode (meaning incomming data has "CONNECT &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.example.com/"&gt;http://www.example.com/&lt;/A&gt;&lt;SPAN&gt; HTTP/1.0" and its the proxy who does the DNS-resolution) along with keepsource=yes so next hop will see the clientip directly in the ip-header.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) PA-device uses userid and can map which user uses which ip either by using PAN-agent or by other userid methods. The PA-device will do the SNAT aswell. This also gives that you can utilize stuff like geoip based rules in your PA if you wish.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) On a DMZ to the PA-device you have your DNS resolvers which the proxy uses to query.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jan 2013 22:45:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-general-web-proxy-server-deployment-with-pan-box/m-p/36652#M26952</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-21T22:45:45Z</dc:date>
    </item>
    <item>
      <title>Re: A general web proxy server deployment with PAN box</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-general-web-proxy-server-deployment-with-pan-box/m-p/36653#M26953</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi mikand,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all, thanks for your comment.&lt;/P&gt;&lt;P&gt;Actually, in this particular situation in one of my customers, I am looking for the solution with (1).&lt;/P&gt;&lt;P&gt;Also, more detailed physical connection is below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt; [Clients] --- [PAN(vwmode)] --- [Proxy] --- [FW(NonePAN)] --- (Internet)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;As you can guess, PAN is not placed yet. That is why there is an existing FW (Not PA), and PAN will be placed between clients and the proxy server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;using virtual-wire mode.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;In addition, the proxy is none-transparent.&amp;nbsp; The idea is not replacing the existing firewall. Instead placing PAN in the above deisgn&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;and control user web access using user-id and app-id as well as web filtering in PAN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;(The proxy is working as just cache server, and web filtering is not enabled on this server.)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 11.818181991577148px; background-color: #ffffff; font-family: Arial, Helvetica, sans-serif;"&gt;In this scenario, can PAN recognize destination-ip from a client as (A) the destination server on internet, or just (B) the ip of proxy server?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 11.818181991577148px; background-color: #ffffff; font-family: Arial, Helvetica, sans-serif;"&gt;My guess is (B), since web browser of client is explicitly configured the ip address of this proxy server...&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 08:51:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-general-web-proxy-server-deployment-with-pan-box/m-p/36653#M26953</guid>
      <dc:creator>tomimma</dc:creator>
      <dc:date>2013-01-22T08:51:52Z</dc:date>
    </item>
    <item>
      <title>Re: A general web proxy server deployment with PAN box</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-general-web-proxy-server-deployment-with-pan-box/m-p/36654#M26954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you really need to use a proxy at all?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just allow your clients direct access to the internet via the PA - simple. I assume everything will be PAT'd out via your firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This allows you to use the full features of the PA web monitoring function..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rod&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 14:24:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-general-web-proxy-server-deployment-with-pan-box/m-p/36654#M26954</guid>
      <dc:creator>djrodb</dc:creator>
      <dc:date>2013-01-22T14:24:35Z</dc:date>
    </item>
    <item>
      <title>Re: A general web proxy server deployment with PAN box</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-general-web-proxy-server-deployment-with-pan-box/m-p/36655#M26955</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this proxy is requirement, unfortunately...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 07:59:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-general-web-proxy-server-deployment-with-pan-box/m-p/36655#M26955</guid>
      <dc:creator>tomimma</dc:creator>
      <dc:date>2013-01-23T07:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: A general web proxy server deployment with PAN box</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-general-web-proxy-server-deployment-with-pan-box/m-p/36656#M26956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What about my suggestion for a solution described in &lt;A __default_attr="1959" __jive_macro_name="thread" class="jive_macro jive_macro_thread" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 08:53:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-general-web-proxy-server-deployment-with-pan-box/m-p/36656#M26956</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-23T08:53:43Z</dc:date>
    </item>
  </channel>
</rss>

