<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic external captive portal in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/external-captive-portal/m-p/50219#M36976</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm thinking about trying something a little out of the square with user-id and captive portal. Let me start with the context and business goal:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The PAN is deployed as a data centre firewall.&lt;/LI&gt;&lt;LI&gt;I'd like to use some policies that permit clients access to an application only if the user is known.&lt;/LI&gt;&lt;LI&gt;I'd like to use some policies that permit clients access to an application for specific users only if they have used strong authentication, specifically a Yubico one time password.&lt;/LI&gt;&lt;LI&gt;Clients platforms are a mixed environment, BYOD, some active directory but not universal.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is how I propose solving the problem:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;use XML-API for the user-id stuff, gather user to IP associations from various authentication logs in close enough to real time.&lt;/LI&gt;&lt;LI&gt;Build an authentication portal with business logic to know when to prompt for a one time password in addition to username and password.&lt;/LI&gt;&lt;LI&gt;Have the PAN redirect HTTP(S) to this portal when necessary.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far I've proved the following can work:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The XML-API user-id stuff.&lt;/LI&gt;&lt;LI&gt;Set the 'Redirect Host' parameter in Captive Portal Settings to an IP of a web server.&lt;/LI&gt;&lt;LI&gt;Use an appropriate Captive Portal and Security policies to redirect the client and permit the traffic to the web server.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not yet coded the user authentication and subsequent redirection back to the intended web page but will be pretty straight forward.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems Paloalto have not intended (thought about) captive portal being used in this way. Has anyone else attempted this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you think of this idea? Can you think of a better way to achieve the same goal?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 28 Feb 2014 02:23:10 GMT</pubDate>
    <dc:creator>ScottHamilton</dc:creator>
    <dc:date>2014-02-28T02:23:10Z</dc:date>
    <item>
      <title>external captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-captive-portal/m-p/50219#M36976</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm thinking about trying something a little out of the square with user-id and captive portal. Let me start with the context and business goal:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The PAN is deployed as a data centre firewall.&lt;/LI&gt;&lt;LI&gt;I'd like to use some policies that permit clients access to an application only if the user is known.&lt;/LI&gt;&lt;LI&gt;I'd like to use some policies that permit clients access to an application for specific users only if they have used strong authentication, specifically a Yubico one time password.&lt;/LI&gt;&lt;LI&gt;Clients platforms are a mixed environment, BYOD, some active directory but not universal.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is how I propose solving the problem:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;use XML-API for the user-id stuff, gather user to IP associations from various authentication logs in close enough to real time.&lt;/LI&gt;&lt;LI&gt;Build an authentication portal with business logic to know when to prompt for a one time password in addition to username and password.&lt;/LI&gt;&lt;LI&gt;Have the PAN redirect HTTP(S) to this portal when necessary.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far I've proved the following can work:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The XML-API user-id stuff.&lt;/LI&gt;&lt;LI&gt;Set the 'Redirect Host' parameter in Captive Portal Settings to an IP of a web server.&lt;/LI&gt;&lt;LI&gt;Use an appropriate Captive Portal and Security policies to redirect the client and permit the traffic to the web server.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not yet coded the user authentication and subsequent redirection back to the intended web page but will be pretty straight forward.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems Paloalto have not intended (thought about) captive portal being used in this way. Has anyone else attempted this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you think of this idea? Can you think of a better way to achieve the same goal?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Feb 2014 02:23:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-captive-portal/m-p/50219#M36976</guid>
      <dc:creator>ScottHamilton</dc:creator>
      <dc:date>2014-02-28T02:23:10Z</dc:date>
    </item>
    <item>
      <title>Re: external captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-captive-portal/m-p/50220#M36977</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A follow-up question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's not clear to me how to configure the PAN so it redirects the client to the captive portal only when the user is not known. Is this possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Feb 2014 02:31:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-captive-portal/m-p/50220#M36977</guid>
      <dc:creator>ScottHamilton</dc:creator>
      <dc:date>2014-02-28T02:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: external captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-captive-portal/m-p/50221#M36978</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In regards to your followup question. A session should only be redirected to captive portal if there is no user/IP mapping yet, if such mapping exists CP should not get triggered. are you seeing the opposite ?&lt;/P&gt;&lt;P&gt;your first post should work just fine if you are able to write the redirect after authentication to the original host to facilitate the user and make the authentication trigger the API which should add a user/IP mapping near instantaneously, it should go beautifully&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Mar 2014 11:15:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-captive-portal/m-p/50221#M36978</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2014-03-06T11:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: external captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-captive-portal/m-p/50222#M36979</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also define a Captive portal rule to identify what source and destination address space you want captive portal to be applied to.&amp;nbsp; Remembering that the traffic needs to traverse a firewall interface and only kicks in if there is no user-id to IP address mapping already in the firewall (as tpiens mentions).&amp;nbsp; It works quite well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Mar 2014 01:46:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-captive-portal/m-p/50222#M36979</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2014-03-07T01:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: external captive portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-captive-portal/m-p/50223#M36980</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could use a PBF rule for "unknown" users. (just not mapped IP with any user) to IP where CP is configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "your captive portal" have to redirect&amp;nbsp; all incomming traffic to destination 80/tcp or 443/tcp to local address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The CP shall be in DMZ (traffic to CP shall pass over firewall) - only then PBF works.&lt;/P&gt;&lt;P&gt;Also CP shall be connected to the different L3 interface than LAN&amp;nbsp; and External.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ex. I have:&lt;/P&gt;&lt;P&gt;e1/1 - Internet/External&lt;/P&gt;&lt;P&gt;e1/2 - LAN&lt;/P&gt;&lt;P&gt;e1/3 - CP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PBF have to change a routing for unknown users from default:&lt;/P&gt;&lt;P&gt;User-&amp;gt;PAN-&amp;gt;Internet&lt;/P&gt;&lt;P&gt;to:&lt;/P&gt;&lt;P&gt;User-&amp;gt;PAN-&amp;gt;Captive Portal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rule on PAN:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="12947" alt="CP_redirect.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/12947_CP_redirect.png" style="width: 620px; height: 37px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IPtables redirect/DNAT on Linux:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to-destination &amp;lt;IP of Captive Portal&amp;gt;:80&lt;/P&gt;&lt;P&gt;iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j DNAT --to-destination &amp;lt;IP of Captive Portal&amp;gt;:443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: HTTPS redirect could generate SSL warning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this you could user XML-API to adding users with timeout value.&lt;/P&gt;&lt;P&gt;There is no idle time as in generic PAN CP, only a timeout.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-4968"&gt;Setting the Timeout for User to IP mapping Created Using User-ID XML-API&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;T.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Apr 2014 21:16:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-captive-portal/m-p/50223#M36980</guid>
      <dc:creator>tomasz.niewdana</dc:creator>
      <dc:date>2014-04-19T21:16:59Z</dc:date>
    </item>
  </channel>
</rss>

