<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Data Filtering - Reverse possible? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-reverse-possible/m-p/45411#M33380</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For a client, we are working on a regulatory need where we need to block any administrator attempts to login to a web application sitting behind the firewall. I created a data filtering rule which looks for the admin names and it DOES block it, however, this is an explicit deny and is the opposite of best practices. What would work best is if we could only ALLOW the 4-5 standard user logins and block anything else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to make the data filtering work in reverse?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 21 Oct 2013 14:09:33 GMT</pubDate>
    <dc:creator>SDorsey</dc:creator>
    <dc:date>2013-10-21T14:09:33Z</dc:date>
    <item>
      <title>Data Filtering - Reverse possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-reverse-possible/m-p/45411#M33380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For a client, we are working on a regulatory need where we need to block any administrator attempts to login to a web application sitting behind the firewall. I created a data filtering rule which looks for the admin names and it DOES block it, however, this is an explicit deny and is the opposite of best practices. What would work best is if we could only ALLOW the 4-5 standard user logins and block anything else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to make the data filtering work in reverse?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Oct 2013 14:09:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-reverse-possible/m-p/45411#M33380</guid>
      <dc:creator>SDorsey</dc:creator>
      <dc:date>2013-10-21T14:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: Data Filtering - Reverse possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-reverse-possible/m-p/45412#M33381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello mackwage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your best bet for this would be a custom application.&amp;nbsp; You will need to:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.) Do a packet capture and get the login string.&amp;nbsp; For example, if your web application uses cookies, a good way would be to look for the cookie string in the HTTP request header, which would look something like: Cookie: username=administrator.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.) Create a custom application which looks for this string:&lt;/P&gt;&lt;P&gt;Objects-&amp;gt;Applications-&amp;gt;Add,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configuration-&amp;gt;(fill out to your needs)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Advanced-&amp;gt;(choose "port" and add: tcp/80 and tcp/443)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Signatures-&amp;gt;Add-&amp;gt;(add "OR" conditions with pattern-match (as many as you need): example: context: http-req-headers, patthern: username=admin)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.) Create a security policy which matches your login traffic:&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;zones: trust-&amp;gt;dmz, destination ip: &amp;lt;web application server ip&amp;gt;, application: Your new custom application, action: deny.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Commit and test it out.&amp;nbsp; If you have your&amp;nbsp; "Application Block Page" enabled in Device-&amp;gt;Response Pages, you should get the block pages when you login as administrator (or whatever the login name was).&amp;nbsp; All other users should not get the page.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*** Remember if you use the string that is in the Cookie, the users will need to clear their cookies if they try with the admin user and get blocked, then want to try again with another user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-chadd.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Oct 2013 21:37:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-reverse-possible/m-p/45412#M33381</guid>
      <dc:creator>cchristiansen</dc:creator>
      <dc:date>2013-10-21T21:37:45Z</dc:date>
    </item>
  </channel>
</rss>

