<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Web Proxy behind PAN firewall and application recognition in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44166#M32415</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are asking about this topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[User]------[Proxy]------[Paloalto]-----(internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then all outbound traffic will be detected as the Proxy and the only traffic seen will be HTTP and HTTPS unless a second interface is picking up the other traffic such as FTP, MAIL, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are asking about:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[User]-------[PaloAlto]-------[Proxy]------(internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then we will see the actual user and all applications destined for the internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 21 Dec 2010 05:23:42 GMT</pubDate>
    <dc:creator>skrall</dc:creator>
    <dc:date>2010-12-21T05:23:42Z</dc:date>
    <item>
      <title>Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44165#M32414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know this question has been asked in other posts but I figured I would give it another try. I would like the PAN to sit between my users and my web proxy *and* for the applications to be recognized instead of just reported as proxy traffic. Is there any setting to force the PANOS to do this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Dec 2010 19:57:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44165#M32414</guid>
      <dc:creator>dustintodd</dc:creator>
      <dc:date>2010-12-17T19:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44166#M32415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are asking about this topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[User]------[Proxy]------[Paloalto]-----(internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then all outbound traffic will be detected as the Proxy and the only traffic seen will be HTTP and HTTPS unless a second interface is picking up the other traffic such as FTP, MAIL, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are asking about:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[User]-------[PaloAlto]-------[Proxy]------(internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then we will see the actual user and all applications destined for the internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 05:23:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44166#M32415</guid>
      <dc:creator>skrall</dc:creator>
      <dc:date>2010-12-21T05:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44167#M32416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if i'm using&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[User]------[Proxy]------[Paloalto]-----(internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is there a way i can see the user?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 10:06:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44167#M32416</guid>
      <dc:creator>kccg</dc:creator>
      <dc:date>2012-07-12T10:06:38Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44168#M32417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Users' traffic should pass through the paloalto first&amp;nbsp; then your proxy!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 11:39:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44168#M32417</guid>
      <dc:creator>bryanpascal</dc:creator>
      <dc:date>2012-07-12T11:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44169#M32418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;is there anyway i can see the user behind the proxy? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 12:53:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44169#M32418</guid>
      <dc:creator>kccg</dc:creator>
      <dc:date>2012-07-12T12:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44170#M32419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;If you just want to identify users you could set up a TAP port on the Palo Alto using a Mirror Port on a switch to inspect the traffic prior to the proxy.&amp;nbsp; I do not recommend&amp;nbsp; inserting the Palo before and after the proxy because this will cause each packet to be inspected twice. Also, if you have BLOCK or CONTINUE pages on policies you can get&amp;nbsp; some unexpected results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve Krall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 16:14:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44170#M32419</guid>
      <dc:creator>skrall</dc:creator>
      <dc:date>2012-07-12T16:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44171#M32420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes if you run a proxy that can act in transparent mode such as the Färist proxyfirewall (www.tutus.se) among others. Meaning that it will keep the srcip unaltered even if the client uses the proxyfirewall as a forward proxy (setup proxysettings in their webbrowser).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way you can use:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[User]------[Proxy]------[Paloalto]-----(internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in two modes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) forward-proxy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The user setup the proxysettings in their webbrowser to point to the proxy. The proxy will then do nameresolution and surf on behalf of the user. The srcip hitting paloalto is the actual user srcip. Paloalto will then NAT outbound traffic towards internet so you get:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- User calls 10.0.0.1:3128 for http or 10.0.0.1:3129 for https (ip of proxy - preferly RFC1918 network).&lt;/P&gt;&lt;P&gt;- Proxy will query DNS and then setup a http/https towards the public ip on the Internet.&lt;/P&gt;&lt;P&gt;- Paloalto will NAT the user srcip before traffic leaves on the internet-interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) transparent-proxy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The user will browse on its own straight to the public ip's on the internet and the proxy will be completely transparent for the user (except for errormessages and such).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- User will query DNS and then setup a http/https towards the public ip on the Internet.&lt;/P&gt;&lt;P&gt;- Paloalto will NAT the user srcip before traffic leaves on the internet-interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally I would prefer the first method because then you can setup triggers in your SIEM so it will scream if packets with public ip's is seen in the core (between User and Proxy) - because this would be a good sign that something is bad with a particular client (like a malware got through).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also because you have a proxy between the paloalto unit (who sits next to Internet) and your internal network this proxy could also protect inbound connections which the paloalto device does towards the panagent servers in order to find out userid of the srcip's it is seeing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 19:59:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44171#M32420</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-07-12T19:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44172#M32421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;my configuration is in vwire mode.&lt;/P&gt;&lt;P&gt;when i see from the traffic log, all traffic to the internet is using source ip the proxy server ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how to configure, to use user-id in this topology?&lt;/P&gt;&lt;P&gt;i already set the zone to use user-id,&lt;/P&gt;&lt;P&gt;user-id work for internal traffic but not work for traffic to the internet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 15 Jul 2012 07:14:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44172#M32421</guid>
      <dc:creator>kccg</dc:creator>
      <dc:date>2012-07-15T07:14:12Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44173#M32422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi skrall,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just curious about your comment. Hope you don't mind if I ask this...&lt;/P&gt;&lt;P&gt;------------------------------------------------------------&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;If you are asking about:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;[User]-------[PaloAlto]-------[Proxy]------(internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;Then we will see the actual user and all applications destined for the internet.&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;---------------------------------------------------------------------------&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;In the above design, the proxy will be standard forward proxy. (That means it is none-transparent)&lt;/P&gt;&lt;P style="background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif;"&gt;In this case, can PA still recognize a client's web access request and shows final destination-ip on internet?&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif;"&gt;I thought, since user's web request goes through this proxy server, destination-ip will be recognized as ip address of proxy server...&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 08:59:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44173#M32422</guid>
      <dc:creator>tomimma</dc:creator>
      <dc:date>2013-01-22T08:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44174#M32423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The traffic logs will show the Proxy IP as the destination as you have said. But URL filtering looks at the actual URL requested to make a classification. And with HTTPS traffic, we look at the FQDN in the certificate to make URL classification. The actual application is detected based on signatures that match the Application layer header (HTTP Ver 1.1, etc). So only some of your reports will be negatively effected. I am not aware of this causing any problems in a production environment. If you really need the the destination IP address you could put one interface in TAP mode and watch the traffic on the other side of the Proxy but there is no good way to correlate the inside traffic and the outside traffic. And be careful about deep inspection of packets twice. This could cause performance degradation in a busy network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 20:02:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44174#M32423</guid>
      <dc:creator>skrall</dc:creator>
      <dc:date>2013-01-22T20:02:26Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44175#M32424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Skrall,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Very clear explanation! Thank you.&lt;/P&gt;&lt;P&gt;I guess there will be always a obstacle when you deploy a proxy server with PA...&lt;/P&gt;&lt;P&gt;Of course, the best solution is not using proxy and let PA handle everything, but many companies request to use a proxy server...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 08:25:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44175#M32424</guid>
      <dc:creator>tomimma</dc:creator>
      <dc:date>2013-01-23T08:25:35Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44176#M32425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The best solution is obviously to rearrange the flow in your case so it becomes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[User]-------[Proxy]-------[PaloAlto]------(internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and by that configure your proxy to keepsource=yes and also allow PaloAlto to communicate with PAN-agent through your proxy (unless your PAN-agent is reachable over mgmt-interface). In this case the PaloAlto will do the SNAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way it doesnt matter if your proxy is a forward-proxy (preferred because you will then have only internal ip's between User and Proxy) or transparent (the difference is that with forward-proxy the clients use CONNECT with dstip as the Proxy ip while in transparent the clients use HEAD/GET/POST with dstip as the real server on internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another possibility, if you only have one set of PaloAltos, is to use VSYS (unless you have some policy which wont let you physically mix external and internal resources in the same hardware - meaning with VSYS you can let VSYS1 be the above internet firewall and VSYS2 will be some internal server firewall).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 08:52:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44176#M32425</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-23T08:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44177#M32426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mikand,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;and by that configure your proxy to keepsource=yes and also allow PaloAlto to communicate with PAN-agent through your proxy (unless your PAN-agent is reachable over mgmt-interface). In this case the PaloAlto will do the SNAT.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;↑ I am not sure exactly what the above means...&amp;nbsp; Are you referring to the specific proxy server model? Also, PAN-OS is 5.x which doesn't use an external PAN-agent.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;How does it work in that case?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 09:21:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44177#M32426</guid>
      <dc:creator>tomimma</dc:creator>
      <dc:date>2013-01-23T09:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44178#M32427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) Keepsource=yes meaning that the proxy on its "internet" interface should use the client-ip as srcip instead of its own. How you do this depends on which proxy you are using. Which vendor and model (and if possible software version) is it in your case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) In order for the PA box to know the users (unless you want to use captive portal which I imagine you want to avoid) the PA must be allowed to speak to the PAN-agent server(s) on your inside network. This means except for rules client (inside) -&amp;gt; internet (outsice) in the proxy you must have a rule which will allow pa (outside) -&amp;gt; pan-agent (inside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PANOS 5.x can use dedicated PAN-agent server(s) as previously. Whats new in PANOS 5.x is that itself contains a limited PAN-agent server (runned in the mgmt-plane) so there is no need for a dedicated server(s) in smaller networks. I dont remember the recommendation for using the internal PAN-agent server in the PA box but it was something like less than 100 users or such. If you network have several hundred or thousands of users the recommendation is to use dedicated PAN-agent servers (or install the PAN-agent service on each DC-server). You can of course still use dedicated PAN-agent server(s) even in small networks (just put that in your VMware cluster or such if you cant spare it a dedicated hardware or install it directly on the DC-servers).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) The PaloAlto will do the SNAT meaning since the PA will see the clientips (which I assume is RFC1918 like 10.x.x.x or 192.168.x.x or such) the PA will do the NAT so this traffic on the interface facing internet will have its srcip replaced into the ip which the PA uses on this internet interface (or if you wish to replace it into some other ip or range of ips which is routed towards the PA by your internetrouter).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 09:45:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44178#M32427</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-23T09:45:22Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44179#M32428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mikand,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I am getting closer to understand your explanation very clearly... but I need to clarify a few things, hope you don't mind.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(1) Keepsource=yes&lt;/P&gt;&lt;P&gt;Are we talking about "X-Forwarded-For" in HTTP header? or you simply meant a proxy can do keep clients IP as the original souce-ip when it sends packets to internet? The customer's proxy is ISA. But I am testing with Squid. How can I enable it in case of the latter case for ISA and Squid?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(2) It can be reachable via management interface. Does this work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 10:32:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44179#M32428</guid>
      <dc:creator>tomimma</dc:creator>
      <dc:date>2013-01-23T10:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44180#M32429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) I was talking about that when the packet leaves your Proxy (towards internet) the srcip will be the clientip (instead of the ip of the physical interface).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like so, before proxy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srcip: &amp;lt;clientip&amp;gt;&lt;/P&gt;&lt;P&gt;dstip: &amp;lt;proxyip_insideinterface&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;after proxy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srcip: &amp;lt;clientip&amp;gt;&lt;/P&gt;&lt;P&gt;dstip: &amp;lt;webserverip&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will check if squid can do the "keepsource=yes" feature and get back, otherwise there are other proxies which can do this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Yes, you can specify which interface to use in Device -&amp;gt; Setup -&amp;gt; Services and then Service route configuration to define which mgmt-services should use the mgmt-interface and which should use one of the dataplane-interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found some info on how to do this with squid:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://wiki.squid-cache.org/Features/Tproxy4"&gt;http://wiki.squid-cache.org/Features/Tproxy4&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://wiki.squid-cache.org/ConfigExamples/Intercept/CentOsTproxy4"&gt;http://wiki.squid-cache.org/ConfigExamples/Intercept/CentOsTproxy4&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://wiki.squid-cache.org/ConfigExamples/FullyTransparentWithTPROXY"&gt;http://wiki.squid-cache.org/ConfigExamples/FullyTransparentWithTPROXY&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.squid-cache.org/mail-archive/squid-users/200705/0443.html"&gt;http://www.squid-cache.org/mail-archive/squid-users/200705/0443.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.squid-cache.org/mail-archive/squid-users/200705/0447.html"&gt;http://www.squid-cache.org/mail-archive/squid-users/200705/0447.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some newer info regarding Squid3:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.deckle.co.uk/squid-users-guide/transparent-caching-proxy.html"&gt;http://www.deckle.co.uk/squid-users-guide/transparent-caching-proxy.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.lesismore.co.za/squid3.html"&gt;http://www.lesismore.co.za/squid3.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The device where I first saw this keepsource=yes feature was in the Farist Firewall &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.tutus.se/products/farist-firewall.html"&gt;http://www.tutus.se/products/farist-firewall.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 10:41:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44180#M32429</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-23T10:41:45Z</dc:date>
    </item>
    <item>
      <title>Re: Web Proxy behind PAN firewall and application recognition</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44181#M32430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, I am not sure if these solutions are feasible for my real situation though...&lt;/P&gt;&lt;P&gt;It looks like it is acting more likely as "transparent", that is all to me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 14:20:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-proxy-behind-pan-firewall-and-application-recognition/m-p/44181#M32430</guid>
      <dc:creator>tomimma</dc:creator>
      <dc:date>2013-01-24T14:20:16Z</dc:date>
    </item>
  </channel>
</rss>

