<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Source IP for SSL Forward Proxy in Virtual Wire Mode in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/source-ip-for-ssl-forward-proxy-in-virtual-wire-mode/m-p/209199#M61173</link>
    <description>&lt;P&gt;on top of how NAT works in a vwire, it is important to note (since you don't mention ssl decryption) your ssl tunnel will not be proxied unless you have ssl decryption enabled, in which case the soure IP will remain the client/NAT ip, the firewall will 'spoof' the appropriate mac and IP while performing decryption.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If ssl is not being decrypted the packets will be passed along and NAT will be applied in-stream (if at all configured)&lt;/P&gt;</description>
    <pubDate>Mon, 09 Apr 2018 07:45:06 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2018-04-09T07:45:06Z</dc:date>
    <item>
      <title>Source IP for SSL Forward Proxy in Virtual Wire Mode</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-ip-for-ssl-forward-proxy-in-virtual-wire-mode/m-p/209160#M61161</link>
      <description>&lt;P&gt;Can someone tell me how to know/what would be the Source IP address for an SSL Tunnel Proxied from the PAN NGFW while running in Virtual Wire Mode ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My topology is very simple:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;User (Virtual Wire) ----&amp;gt; PAN ----&amp;gt; Internet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does the Firewall initiate the Proxied SSL Tunnel using the management interface IP address with the Untrust Zone ?&lt;/P&gt;</description>
      <pubDate>Sun, 08 Apr 2018 16:38:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-ip-for-ssl-forward-proxy-in-virtual-wire-mode/m-p/209160#M61161</guid>
      <dc:creator>Karim_Sabry</dc:creator>
      <dc:date>2018-04-08T16:38:32Z</dc:date>
    </item>
    <item>
      <title>Re: Source IP for SSL Forward Proxy in Virtual Wire Mode</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-ip-for-ssl-forward-proxy-in-virtual-wire-mode/m-p/209167#M61162</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80785"&gt;@Karim_Sabry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The firewall will use the IP address that you have configured in your NAT policy. If you don't have a NAT policy the source IP will be the actual source IP of the client, but this configuration won't work unless you have public IPs in your client network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An example for NAT with VWire you can find here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/networking/nat/nat-configuration-examples/virtual-wire-source-nat-example" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/networking/nat/nat-configuration-examples/virtual-wire-source-nat-example&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Apr 2018 17:40:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-ip-for-ssl-forward-proxy-in-virtual-wire-mode/m-p/209167#M61162</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-04-08T17:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: Source IP for SSL Forward Proxy in Virtual Wire Mode</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-ip-for-ssl-forward-proxy-in-virtual-wire-mode/m-p/209199#M61173</link>
      <description>&lt;P&gt;on top of how NAT works in a vwire, it is important to note (since you don't mention ssl decryption) your ssl tunnel will not be proxied unless you have ssl decryption enabled, in which case the soure IP will remain the client/NAT ip, the firewall will 'spoof' the appropriate mac and IP while performing decryption.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If ssl is not being decrypted the packets will be passed along and NAT will be applied in-stream (if at all configured)&lt;/P&gt;</description>
      <pubDate>Mon, 09 Apr 2018 07:45:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-ip-for-ssl-forward-proxy-in-virtual-wire-mode/m-p/209199#M61173</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-04-09T07:45:06Z</dc:date>
    </item>
  </channel>
</rss>

