<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking traffic from specific AD Computer in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-traffic-from-specific-ad-computer/m-p/4787#M3527</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is UserID ignoring this for a particular reason or would a feature request through the local sales engineer change this behaviour?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: In PANOS 5.0 if im not mistaken Globalprotect will have a similar feature where you in the security policy can choose "preauth-user" as userid (compared to todays known-user etc).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Oct 2012 20:12:32 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-10-24T20:12:32Z</dc:date>
    <item>
      <title>Blocking traffic from specific AD Computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-traffic-from-specific-ad-computer/m-p/4783#M3523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Everyone!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to treat trafic from an specific Computer in AD ?&lt;/P&gt;&lt;P&gt;I need to block internet traffic and allow only internet corporate email (gmail) to some computers (doesnt matter the user logged in there)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can fix thos MACs to the DHCP so they will receive always the same IP and I can treat those traffic... But I would like to know if Palo Alto can deal with Computers as well.. the same way it deals w/ AD users...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Oct 2012 13:28:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-traffic-from-specific-ad-computer/m-p/4783#M3523</guid>
      <dc:creator>FabioGarcia</dc:creator>
      <dc:date>2012-10-22T13:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking traffic from specific AD Computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-traffic-from-specific-ad-computer/m-p/4784#M3524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since the machines will be having static IP addresses, adding these machines as address objects under the source address column in a security rule and applying the security profile or application should do the job..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2012 14:21:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-traffic-from-specific-ad-computer/m-p/4784#M3524</guid>
      <dc:creator>kalyanram.piratla</dc:creator>
      <dc:date>2012-10-23T14:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking traffic from specific AD Computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-traffic-from-specific-ad-computer/m-p/4785#M3525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dont forget to setup DHCP snooping (along with Option82 for logging) and DAI (Dynamic Arp Inspection) so your box you want to limit just not changes its ip address manually and connects to the network to bypass the filtering.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2012 15:57:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-traffic-from-specific-ad-computer/m-p/4785#M3525</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-10-23T15:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking traffic from specific AD Computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-traffic-from-specific-ad-computer/m-p/4786#M3526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Computer names from AD (with the $ preceding) are ignored in the UserID agent and as such you will not be able to deal with the computer names as you do with AD Usernames. As the UserID Agent will not create an IP to User Mapping for the computer you will not be able to block traffic in the security policy, based on the computer name. If you have a particular subnet or static IP addresses that these computers come from, that may be the simplest way to block their specific traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Oct 2012 15:29:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-traffic-from-specific-ad-computer/m-p/4786#M3526</guid>
      <dc:creator>sjamaluddin</dc:creator>
      <dc:date>2012-10-24T15:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking traffic from specific AD Computer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-traffic-from-specific-ad-computer/m-p/4787#M3527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is UserID ignoring this for a particular reason or would a feature request through the local sales engineer change this behaviour?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: In PANOS 5.0 if im not mistaken Globalprotect will have a similar feature where you in the security policy can choose "preauth-user" as userid (compared to todays known-user etc).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Oct 2012 20:12:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-traffic-from-specific-ad-computer/m-p/4787#M3527</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-10-24T20:12:32Z</dc:date>
    </item>
  </channel>
</rss>

