<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto behind ReverseProxy, how block real IP ? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-behind-reverseproxy-how-block-real-ip/m-p/236354#M67737</link>
    <description>&lt;P&gt;I have never tried it but if the firewall cannot assign a user to the xff IP it will add "x-fwd-for: IP-ADDRESS" in the source user field. Could be worth a try to use exactly that in the security policy as source user to create "source IP" based policies even with a reverse proxy in front of the paloalto firewall.&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClViCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClViCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;... or you place the reverse proxy also behind the paloalto firewall &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 20 Oct 2018 21:23:10 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-10-20T21:23:10Z</dc:date>
    <item>
      <title>Palo Alto behind ReverseProxy, how block real IP ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-behind-reverseproxy-how-block-real-ip/m-p/236146#M67692</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have many website behind my Palo Alto.&lt;/P&gt;&lt;P&gt;In front of many websites (and then Palo Alto), I have Reverse Proxy.&lt;/P&gt;&lt;P&gt;Into traffic logs I see Reverse proxy IP, not the real visitor IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have enabled "Use X-Forwarded-For" and now I see Real IP into colum X-Forwarded-For in Url Filtering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But, it's possible to apply Security Profiles based on the IP of the x-forwarded-for header?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Manuel&lt;/P&gt;</description>
      <pubDate>Fri, 19 Oct 2018 12:23:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-behind-reverseproxy-how-block-real-ip/m-p/236146#M67692</guid>
      <dc:creator>ManuelRighi</dc:creator>
      <dc:date>2018-10-19T12:23:23Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto behind ReverseProxy, how block real IP ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-behind-reverseproxy-how-block-real-ip/m-p/236172#M67695</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85716"&gt;@ManuelRighi&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;No, the X-Forwarded-For field can't be utilized in security policies unless you first utilize X-Forwarded-For for User-ID; when using X-Forwarded-For you would need to have a user-id mapping to that IP address to really get any benefit out of it from a security rulebase perspective. This may or may not be usable in your current situation, dending on if the sites are internal or external.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would reach out to your SE so that they can look and see if there is an existing Feature Request for this that he can add your vote to, and if not have him make one.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Oct 2018 13:35:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-behind-reverseproxy-how-block-real-ip/m-p/236172#M67695</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-19T13:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto behind ReverseProxy, how block real IP ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-behind-reverseproxy-how-block-real-ip/m-p/236186#M67698</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85716"&gt;@ManuelRighi&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually, I believe you can use the XFF IP address in a security policy &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device -&amp;gt; Setup -&amp;gt; Content-ID -&amp;gt; "X-Forwarded-For Headers"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;Use X-Forwarded-For Header in User-ID"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/translated/70/newfeaturesguide/user-id-features/user-attribution-based-on-x-forwarded-for-headers" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/translated/70/newfeaturesguide/user-id-features/user-attribution-based-on-x-forwarded-for-headers&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Oct 2018 14:03:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-behind-reverseproxy-how-block-real-ip/m-p/236186#M67698</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2018-10-19T14:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto behind ReverseProxy, how block real IP ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-behind-reverseproxy-how-block-real-ip/m-p/236195#M67700</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/52796"&gt;@LukeBullimore&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Right. As stated above, you can utilize the X-Forwarded-For header IP for user-ID mapping. This doesn't mean that you can utilize the X-Forwarded-For IP as a source IP when configuring policy or anything like that. It simply means that you could assign the XFF header IP to a user, and then use that user-id in policy, not the XFF IP. The source address that the firewall sees will continue to be the address actually sending the traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Oct 2018 14:20:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-behind-reverseproxy-how-block-real-ip/m-p/236195#M67700</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-19T14:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto behind ReverseProxy, how block real IP ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-behind-reverseproxy-how-block-real-ip/m-p/236354#M67737</link>
      <description>&lt;P&gt;I have never tried it but if the firewall cannot assign a user to the xff IP it will add "x-fwd-for: IP-ADDRESS" in the source user field. Could be worth a try to use exactly that in the security policy as source user to create "source IP" based policies even with a reverse proxy in front of the paloalto firewall.&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClViCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClViCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;... or you place the reverse proxy also behind the paloalto firewall &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Oct 2018 21:23:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-behind-reverseproxy-how-block-real-ip/m-p/236354#M67737</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-10-20T21:23:10Z</dc:date>
    </item>
  </channel>
</rss>

