<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can PAN block proxy traffic originated from other country? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/can-pan-block-proxy-traffic-originated-from-other-country/m-p/7000#M5164</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well if its a problem that attackers use local vpn services in your country then you should change your policy model from a blacklisting one into a whitelisting one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is find out which ip ranges should be allowed and work your way from there - all other ranges will then by default be blocked.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 30 Aug 2013 21:34:49 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2013-08-30T21:34:49Z</dc:date>
    <item>
      <title>Can PAN block proxy traffic originated from other country?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-pan-block-proxy-traffic-originated-from-other-country/m-p/6998#M5162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello guys&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to block some traffic originated from other country. PAN can block those traffics with its source address and regional info. But what if they use some kind of proxy(like ultra surf) to disguise its original source ip and change its ip to domestic ip , and what if they use ssl proxy? If that ssl server is in my country, its source ip will be change to domestic one. PAN can block proxy application originated from its internal network, but it seems hard to block proxied traffic originated from out side area. Do you have any solution for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much. :smileygrin:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 15:42:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-pan-block-proxy-traffic-originated-from-other-country/m-p/6998#M5162</guid>
      <dc:creator>JTR</dc:creator>
      <dc:date>2013-08-30T15:42:16Z</dc:date>
    </item>
    <item>
      <title>Re: Can PAN block proxy traffic originated from other country?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-pan-block-proxy-traffic-originated-from-other-country/m-p/6999#M5163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi...Yes, this is a challenge and there's no effective way to detect &amp;amp; control the proxy traffic.&amp;nbsp; It's like using NAT to hide the original client IP address.&amp;nbsp; If the proxy/NAT device does not forward the client's real IP address, there's no method to detect it. Some proxy will insert an HTTP header like X-Forward-For or Via: and we can write a custom sign to detect it.&amp;nbsp; However, those headers are not always present.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe others on this forum may have some other ideas.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 20:43:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-pan-block-proxy-traffic-originated-from-other-country/m-p/6999#M5163</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2013-08-30T20:43:51Z</dc:date>
    </item>
    <item>
      <title>Re: Can PAN block proxy traffic originated from other country?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-pan-block-proxy-traffic-originated-from-other-country/m-p/7000#M5164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well if its a problem that attackers use local vpn services in your country then you should change your policy model from a blacklisting one into a whitelisting one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is find out which ip ranges should be allowed and work your way from there - all other ranges will then by default be blocked.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 21:34:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-pan-block-proxy-traffic-originated-from-other-country/m-p/7000#M5164</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-08-30T21:34:49Z</dc:date>
    </item>
    <item>
      <title>Re: Can PAN block proxy traffic originated from other country?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-pan-block-proxy-traffic-originated-from-other-country/m-p/7001#M5165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks you guys, I think it's not only the PAN's issue. Can I understand that there's no other device which can do this? White list might be a good idea, but it's too hard to sort ssl proxy ips.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 22:49:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-pan-block-proxy-traffic-originated-from-other-country/m-p/7001#M5165</guid>
      <dc:creator>JTR</dc:creator>
      <dc:date>2013-08-30T22:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: Can PAN block proxy traffic originated from other country?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-pan-block-proxy-traffic-originated-from-other-country/m-p/7002#M5166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well the point of using a ssl-proxy or a vpn service for that matter is to hide the true srcip. This way the target will only see the ip of the ssl-proxy/vpn-service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If its a bad server then x-forwarding-for, x-client-ip and similar http headers might "leak" through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are various "counterattacks" one can use to in some situations still identify the true ip (or other data such as mac address etc). You can for example inject a java applet that will gather local data and post it back to the server (that is if you have a webpage where you can inject such things - the question is if this is a good thing to do or not ethically).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another method is if the vpn service is badly setup you can figure out at least the ISP (if lucky) by forcing the client to request random subdomains - which when you at the same time monitor your authoritive dns servers for this zone could pick up from where in the world the request for this particular "one time subdomain" originates from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When it comes to public services such as tor you can use these lists to dynamically import the contents into PA and have for example all TOR exit nodes (well most of them) blocked from accessing your site:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://torstatus.blutmagie.de/ip_list_all.php/Tor_ip_list_ALL.csv"&gt;http://torstatus.blutmagie.de/ip_list_all.php/Tor_ip_list_ALL.csv&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://torstatus.blutmagie.de/ip_list_exit.php/Tor_ip_list_EXIT.csv"&gt;http://torstatus.blutmagie.de/ip_list_exit.php/Tor_ip_list_EXIT.csv&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately I doubt that appid would be of any help here regarding ultrasurf because appid will in that case only be useful when the PA sits such as client &amp;lt;-&amp;gt; PA &amp;lt;-&amp;gt; Ultrasurfproxy and not client &amp;lt;-&amp;gt; Ultrasurfproxy &amp;lt;-&amp;gt; PA &amp;lt;-&amp;gt; server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if this is a problem for you I still believe that the best option for you would be to use a whitelist for which srcip's are allowed to access your, for example, webservers. That is a blacklist first to block known bad ip's followed by a whitelist of allowed ip's - the easy way here would be to use the builtin geoip function of PA (which is somewhat accurate - I guess PA uses the Maxmind databases for this).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 31 Aug 2013 22:52:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-pan-block-proxy-traffic-originated-from-other-country/m-p/7002#M5166</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-08-31T22:52:15Z</dc:date>
    </item>
    <item>
      <title>Re: Can PAN block proxy traffic originated from other country?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-pan-block-proxy-traffic-originated-from-other-country/m-p/7003#M5167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you mikand, wish you have a good luck!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Sep 2013 06:32:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-pan-block-proxy-traffic-originated-from-other-country/m-p/7003#M5167</guid>
      <dc:creator>JTR</dc:creator>
      <dc:date>2013-09-06T06:32:33Z</dc:date>
    </item>
  </channel>
</rss>

