<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Block Vpn in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/block-vpn/m-p/74696#M41762</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;How to block ssl vpn and &amp;nbsp;ipsec vpn going from trust to untrust .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suspect few users are using &amp;nbsp;like free vpn services like &amp;nbsp;tunnel beer and hola vpn .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can i &amp;nbsp;search those users &amp;nbsp;from palo alto log.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some users are connected from inside to outside world (for official purpose ) using cisco anyconnect (ssl ) and ipsec .And i don't want revoke their permission . ( I need only monitor those users )&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 15 Mar 2016 01:08:44 GMT</pubDate>
    <dc:creator>sib2017</dc:creator>
    <dc:date>2016-03-15T01:08:44Z</dc:date>
    <item>
      <title>Block Vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-vpn/m-p/74696#M41762</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;How to block ssl vpn and &amp;nbsp;ipsec vpn going from trust to untrust .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suspect few users are using &amp;nbsp;like free vpn services like &amp;nbsp;tunnel beer and hola vpn .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can i &amp;nbsp;search those users &amp;nbsp;from palo alto log.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some users are connected from inside to outside world (for official purpose ) using cisco anyconnect (ssl ) and ipsec .And i don't want revoke their permission . ( I need only monitor those users )&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 01:08:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-vpn/m-p/74696#M41762</guid>
      <dc:creator>sib2017</dc:creator>
      <dc:date>2016-03-15T01:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: Block Vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-vpn/m-p/74702#M41767</link>
      <description>&lt;P&gt;Hi Sib&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;as it's pretty difficult to differentiate between good and bad ipsec, i would recommend creating security policy based on user instead so you can allow certain users to have vpn tunnels while denying everyone else&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;please take a look at this article: &lt;A title="Getting Started: User-ID" href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-User-ID/ta-p/69321" target="_blank"&gt;Getting Started: User-ID&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To be able to identify the different applications used you will need to enable ssl decryption: &lt;A title="SSL decryption resource list" href="https://live.paloaltonetworks.com/t5/Management-Articles/SSL-decryption-resource-list/ta-p/70397" target="_blank"&gt;SSL decryption resource list&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;lastly, to control all vpn/encrypted tunnel applications, you can create a behavior based application group (called an application filter) which will automatically contain all applications that create encrypted tunnels, and use that in a security policy to control access to these applications&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/3085iCA41FFA931029304/image-size/original?v=mpbl-1&amp;amp;px=-1" alt="application filter" title="application filter" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 08:58:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-vpn/m-p/74702#M41767</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-03-15T08:58:00Z</dc:date>
    </item>
    <item>
      <title>Re: Block Vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-vpn/m-p/74714#M41770</link>
      <description>&lt;P&gt;You should consider deploying a url filter that has the category for proxy avoidance/ anonymizers blocked. &amp;nbsp;This category is designed to block the activity you describe.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 10:14:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-vpn/m-p/74714#M41770</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2016-03-15T10:14:15Z</dc:date>
    </item>
  </channel>
</rss>

