<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL VPN - DHCP Relay and Deny lists in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-dhcp-relay-and-deny-lists/m-p/41432#M30465</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a way to configure the SSL VPN to rely on DHCP relay instead of using it's own internal IP pool?&amp;nbsp; I thought enabling it on the public interface might work, but I don't really like the thought of anyone in that same segment getting one of our private IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, is there a way to explicitly deny a user or group access to the SSL VPN even if they are a member of an allowed group?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Feb 2010 20:32:50 GMT</pubDate>
    <dc:creator>jdorland</dc:creator>
    <dc:date>2010-02-23T20:32:50Z</dc:date>
    <item>
      <title>SSL VPN - DHCP Relay and Deny lists</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-dhcp-relay-and-deny-lists/m-p/41432#M30465</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a way to configure the SSL VPN to rely on DHCP relay instead of using it's own internal IP pool?&amp;nbsp; I thought enabling it on the public interface might work, but I don't really like the thought of anyone in that same segment getting one of our private IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, is there a way to explicitly deny a user or group access to the SSL VPN even if they are a member of an allowed group?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 20:32:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-dhcp-relay-and-deny-lists/m-p/41432#M30465</guid>
      <dc:creator>jdorland</dc:creator>
      <dc:date>2010-02-23T20:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSL VPN - DHCP Relay and Deny lists</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-dhcp-relay-and-deny-lists/m-p/41433#M30466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You asked:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to configure the SSL VPN to rely on DHCP relay instead of using it's own internal IP pool?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently, there is no way to do this on the Paloalto device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You asked:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, is there a way to explicitly deny a user or group access to the SSL VPN even if they are a member of an allowed group?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you can. Simply make note of the zone that you have placed the tunnel interface for the ssl vpn. Then you can&amp;nbsp; create deny policies with that zone as the destination zone and identify corresponding source zones, source users, source ips that you would like to deny access to the ssl vpn portal......basically, the same way that create any other deny policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 22:00:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-dhcp-relay-and-deny-lists/m-p/41433#M30466</guid>
      <dc:creator>swhyte</dc:creator>
      <dc:date>2010-02-23T22:00:25Z</dc:date>
    </item>
  </channel>
</rss>

