<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reverse Proxy and X-forwarded-for in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/289223#M76945</link>
    <description>&lt;P&gt;Try creating a custom URL Filtering with your sites or * and apply it to a URL Filtering Profile which is then attached to your rule(s) processing inbound traffic. This can be done without the need for our PAN-DB URL Filtering subscription. &lt;A href="https://live.paloaltonetworks.com/t5/General-Topics/Configuring-XFF-logging-without-a-URL-Filtering-License/td-p/239987" target="_self"&gt;This&lt;/A&gt;&amp;nbsp;post has some useful steps that may be helpful. Although the true source IP will be added to the Source User field in your URL logs, they can also be leveraged when looking at other logs through 'Related Logs' feature.&amp;nbsp; Good luck and please post if it works or not.&lt;/P&gt;</description>
    <pubDate>Thu, 19 Sep 2019 18:27:09 GMT</pubDate>
    <dc:creator>lagop</dc:creator>
    <dc:date>2019-09-19T18:27:09Z</dc:date>
    <item>
      <title>Reverse Proxy and X-forwarded-for</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/184603#M56603</link>
      <description>&lt;P&gt;We use a load balancer to terminate SSL connections coming into our publicly accessible web servers from the Internet.&amp;nbsp; The same load balancers are used as a reverse proxy.&amp;nbsp; Because this produces a blind-spot for us, we have configured the load balancer to insert the real Internet IP into the XFF entry of the resulting inbound HTTP packet (we don't re-encrypt the packet after the load balancer has decrypted it).&amp;nbsp; I can't find a way to generate a report that shows the XFF entries within packets coming into the firewall from the load balancer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All documentation I can find is for outbound traffic going over a proxy server (not reverse-proxy).&amp;nbsp; Can the firewall retrieve the XFF entries from packets coming from a reverse-proxy sourced from the Internet?&amp;nbsp; If so, how can I generate a report that shows this information?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 30 Oct 2017 22:15:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/184603#M56603</guid>
      <dc:creator>MerrickNetworkEngineers</dc:creator>
      <dc:date>2017-10-30T22:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse Proxy and X-forwarded-for</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/184670#M56610</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;have you enabled x-forward for?&amp;nbsp;&lt;A title="How to Enable Support for the X-Forwarded-For HTTP Header" href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Enable-Support-for-the-X-Forwarded-For-HTTP-Header/ta-p/60442" target="_blank"&gt;How to Enable Support for the X-Forwarded-For HTTP Header&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;reaper@myNGFW&amp;gt; configure 
Entering configuration mode
[edit]                                                                          
reaper@myNGFW# set deviceconfig setting ctd x-forwarded-for 
  no    no 
  yes   yes 
&lt;/PRE&gt;</description>
      <pubDate>Tue, 31 Oct 2017 08:15:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/184670#M56610</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-10-31T08:15:11Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse Proxy and X-forwarded-for</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/184752#M56625</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/47108"&gt;@MerrickNetworkEngineers&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I deleted your comments in the KB article as those would not make sense from a conversational standpoint&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have enabled the x-forward for headers, then we move on to the next step: have you enabled user-id in the zone where the load balancers sit?&lt;/P&gt;
&lt;P&gt;&lt;IMG class="lia-media-image" src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/1630i9032EACD60C385DF/image-size/large?v=1.0&amp;amp;px=800" alt="user identification zone" title="user identification zone" border="0" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2017 15:04:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/184752#M56625</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-10-31T15:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse Proxy and X-forwarded-for</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/184759#M56627</link>
      <description>&lt;P&gt;Yes.&amp;nbsp; User-ID is enabled for the zone the LB is in.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2017 15:19:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/184759#M56627</guid>
      <dc:creator>MerrickNetworkEngineers</dc:creator>
      <dc:date>2017-10-31T15:19:02Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse Proxy and X-forwarded-for</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/184762#M56628</link>
      <description>&lt;P&gt;An item of note in the document you refer to is that it appears that XFF entries in the Source User field is only support with URL filtering.&amp;nbsp; I'm not doing any URL filtering for inbound reverse-proxied connections.&amp;nbsp; There is not reason I can think of to do URL filtering on an inbound connection through a reverse-proxy.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2017 15:37:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/184762#M56628</guid>
      <dc:creator>MerrickNetworkEngineers</dc:creator>
      <dc:date>2017-10-31T15:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse Proxy and X-forwarded-for</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/184763#M56629</link>
      <description>&lt;P&gt;Ah, that would explain why it's not working working as expected&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;XFF plugs in in the URL filtering layer on the firewall, if you haven't got URL filtering enabled the headers will be ignored&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="XFF Headers" href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-id-concepts/user-mapping/xff-headers" target="_blank"&gt;XFF Headers&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2017 15:56:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/184763#M56629</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-10-31T15:56:26Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse Proxy and X-forwarded-for</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/289223#M76945</link>
      <description>&lt;P&gt;Try creating a custom URL Filtering with your sites or * and apply it to a URL Filtering Profile which is then attached to your rule(s) processing inbound traffic. This can be done without the need for our PAN-DB URL Filtering subscription. &lt;A href="https://live.paloaltonetworks.com/t5/General-Topics/Configuring-XFF-logging-without-a-URL-Filtering-License/td-p/239987" target="_self"&gt;This&lt;/A&gt;&amp;nbsp;post has some useful steps that may be helpful. Although the true source IP will be added to the Source User field in your URL logs, they can also be leveraged when looking at other logs through 'Related Logs' feature.&amp;nbsp; Good luck and please post if it works or not.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 18:27:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/289223#M76945</guid>
      <dc:creator>lagop</dc:creator>
      <dc:date>2019-09-19T18:27:09Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse Proxy and X-forwarded-for</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/306956#M79725</link>
      <description>&lt;P&gt;I'm working on this as well. To be clear, this has to be enabled &lt;STRIKE&gt;twice&lt;/STRIKE&gt;&amp;nbsp;in three places.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) the GUI URL Filtering Profile -&amp;gt; URL Filtering Settings (tab)&lt;/P&gt;&lt;P&gt;2) cli --&amp;gt;&amp;nbsp; &amp;nbsp;&amp;gt;&lt;SPAN&gt;configure&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;# set deviceconfig setting ctd x-forwarded-for yes|no&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClIVCA0" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClIVCA0&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3) create a custom URL Category with your sites listed, apply this custom category to a URL Filtering Profile, and apply the filtering profile to the appropriate security policies&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is working for me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2020 19:32:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/reverse-proxy-and-x-forwarded-for/m-p/306956#M79725</guid>
      <dc:creator>MikeSangray2019</dc:creator>
      <dc:date>2020-01-16T19:32:53Z</dc:date>
    </item>
  </channel>
</rss>

