<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Captive Portal - need help with configuration in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-need-help-with-configuration/m-p/10456#M7707</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to add, if you need to see DHCP negotiations, allocations and events, you can tail or less the dhcpd for this information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; tail follow yes mp-log dhcpd.log&lt;/P&gt;&lt;P&gt;(for more information, you can also set the dhcpd to debug mode with the 'debug dhcpd global on debug' debug).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.: Always remember to turn off debugging when done troubleshooting so the device doesn't crash on you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;tasonibre&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 16 Dec 2013 20:48:46 GMT</pubDate>
    <dc:creator>tasonibare</dc:creator>
    <dc:date>2013-12-16T20:48:46Z</dc:date>
    <item>
      <title>Captive Portal - need help with configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-need-help-with-configuration/m-p/10452#M7703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using CP since over 6 months. It's working quite good.&lt;/P&gt;&lt;P&gt;I moved my servers from internet (untrust zone) to my DMZ zone. I realized that traffic between WiFi network and servers in DMZ (using public adreses) is allowed without CP.&lt;/P&gt;&lt;P&gt;In WiFi zone I have two networks: WiFi and WiFi_konferencja - traffic between them also should be blocked.&lt;/P&gt;&lt;P&gt;I created two security policies (that are now disabled)&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-12-12_172736.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10236_2013-12-12_172736.png" style="width: 620px; height: 334px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-12-12_172934.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10237_2013-12-12_172934.png" style="width: 620px; height: 367px;" /&gt;&lt;/P&gt;&lt;P&gt;Policies in red rectangle are used without CP for four AP's with old config. This isn't a problem.&lt;/P&gt;&lt;P&gt;and one CP policy:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-12-12_173053.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10238_2013-12-12_173053.png" style="width: 620px; height: 211px;" /&gt;&lt;/P&gt;&lt;P&gt;My NAT policy looks like:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-12-12_173651.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10239_2013-12-12_173651.png" style="width: 620px; height: 191px;" /&gt;&lt;/P&gt;&lt;P&gt;How to fix my policies to make evert traffic from WiFi zone and WiFi network must be redirected to CP first, and afer authentication allowed?&lt;/P&gt;&lt;P&gt;Why security policy "'WiFi blokowanie koniec2" blocking a lot of traffic from IP's from that zone to gateway to port 67? I have dhcp server on gateway interface in WiFi network.&lt;/P&gt;&lt;P&gt;Comnputers in WiFi network got proper IPs...&lt;/P&gt;&lt;P&gt;For clarification:&lt;/P&gt;&lt;P&gt;DMZ has network 10.100.10.x&lt;/P&gt;&lt;P&gt;WiFi has 192.168.30.x&lt;/P&gt;&lt;P&gt;www_zew has public IP&lt;/P&gt;&lt;P&gt;www_wew has private 10.100.10.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Help me please. In doc according CP there isn't such situation explained.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Dec 2013 16:51:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-need-help-with-configuration/m-p/10452#M7703</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-12-12T16:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - need help with configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-need-help-with-configuration/m-p/10453#M7704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SLawek,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your requirements are a little unclear, but I think you are trying to describe two issues, so please correct me if I'm wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q1. You need every traffic from WiFi zone going to the DMZ_wew zone to get captive portaled. Correct?&lt;/P&gt;&lt;P&gt;A1. Your captive portal policy is configured to only CP traffic going to Moodle_zew and WWW_zew destinations. If your users traffic are going to other destinations not included in these 2, then they will not get CP'd. Can you change the destination network to 'any' and see if they start getting captive portaled?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q2. You are seeing "WiFi blokowanie koniec2" security policy block DHCP traffic that is supposed to be in the same zone. Correct?&lt;/P&gt;&lt;P&gt;A2. Based on the security policy configured, if there's no other matching rule for DHCP traffic until it hits this rule, then even the same zone traffic will be denied because of the 'any' destination zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if my understanding of the problems are clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;tasonibare&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Dec 2013 00:31:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-need-help-with-configuration/m-p/10453#M7704</guid>
      <dc:creator>tasonibare</dc:creator>
      <dc:date>2013-12-13T00:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - need help with configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-need-help-with-configuration/m-p/10454#M7705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tasonibare&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for my english ... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q1: Yes, my captive portal policy is configured to only CP traffic going to Moodle_zew and WWW_zew destinations. I did it for testing purposes. &lt;/P&gt;&lt;P&gt;Today I changed it to any&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-12-13_101538.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10259_2013-12-13_101538.png" style="width: 620px; height: 44px;" /&gt;&lt;/P&gt;&lt;P&gt;and I got strange for me situation.&lt;/P&gt;&lt;P&gt;From VM Linux workstation (the same I used earlier) from WiFi network I CAN open webpage of Moogle (using it public address) by HTTPS without redirecting to CP, when I put in browser HTTP adress I get CP login page.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q2: Correct, I know it - but I;d like to someone confirm it for me too.&lt;/P&gt;&lt;P&gt;My policies looks like:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-12-13_102045.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10260_2013-12-13_102045.png" style="width: 620px; height: 54px;" /&gt;&lt;/P&gt;&lt;P&gt;"WiFi 1" and "WiFi 2" should block traffic between this two networks, and it did.&lt;/P&gt;&lt;P&gt;I don't understand what is going with same zone traffic.&lt;/P&gt;&lt;P&gt;Before I add policy "WiFi to WiFi" my VM get dhcp responce from server.&amp;nbsp; I try to "catch" traffic from CLI.&lt;/P&gt;&lt;P&gt;I disconnected VM and connected again and immediately I launched from CLI:&lt;/P&gt;&lt;P&gt;admin@PA-200&amp;gt; show session all filter source 192.168.30.32&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Application&amp;nbsp;&amp;nbsp;&amp;nbsp; State&amp;nbsp;&amp;nbsp; Type Flag&amp;nbsp; Src[Sport]/Zone/Proto (translated IP[Port])&lt;/P&gt;&lt;P&gt;Vsys&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dst[Dport]/Zone (translated IP[Port])&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;9315&amp;nbsp;&amp;nbsp;&amp;nbsp; dns&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACTIVE&amp;nbsp; FLOW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.30.32[49409]/WiFi/17&amp;nbsp; (192.168.30.32[49409])&lt;/P&gt;&lt;P&gt;vsys1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.30.1[53]/WiFi&amp;nbsp; (192.168.30.1[53])&lt;/P&gt;&lt;P&gt;11517&amp;nbsp;&amp;nbsp; web-browsing&amp;nbsp;&amp;nbsp; ACTIVE&amp;nbsp; FLOW&amp;nbsp; NS&amp;nbsp;&amp;nbsp; 192.168.30.32[36821]/WiFi/6&amp;nbsp; (94.124.14.143[13414])&lt;/P&gt;&lt;P&gt;vsys1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 94.124.11.170[80]/untrust&amp;nbsp; (94.124.11.170[80])&lt;/P&gt;&lt;P&gt;40928&amp;nbsp;&amp;nbsp; ssl&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACTIVE&amp;nbsp; FLOW&amp;nbsp; ND&amp;nbsp;&amp;nbsp; 192.168.30.32[40159]/WiFi/6&amp;nbsp; (192.168.30.32[40159])&lt;/P&gt;&lt;P&gt;vsys1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.110.1[6082]/captive-portal&amp;nbsp; (127.3.1.1[6185])&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but here isn't dhcp traffic &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;. In system log is a entry "'DHCP lease started ip 192.168.30.32 --&amp;gt; mac 00:50:56:aa:62:85, interface ethernet1/4.3'"&lt;/P&gt;&lt;P&gt;but this traffic doesn't hit&amp;nbsp; "WiFi to WiFi" policy (I have log at session end enabled).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Dec 2013 09:38:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-need-help-with-configuration/m-p/10454#M7705</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-12-13T09:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - need help with configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-need-help-with-configuration/m-p/10455#M7706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the clarification and sorry for the delayed response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. From your CP policy, you have the service set to 'default'. This would only hijack HTTP traffic and not HTTPS traffic. (Sorry I missed this in my first response).&lt;/P&gt;&lt;P&gt;You need to enable both http and https services in the CP policy in order for the firewall to hijack both types of traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Furthermore, even though the firewall was not hijacking HTTPS traffic for CP, the only reason why the traffic was successful is because there's a security policy permitting SSL for 'any' or 'unknown' users.&lt;/P&gt;&lt;P&gt;Verify that you are only permitting SSL access for known users from the Wifi zone to the internet zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. If the PA interface is configured to be your DHCP server, then we do not log the DHCP negotiation in our traffic logs. These are host services and not traffic traversing the firewall's DP and that's why it doesn't get logged, or a session created for you to see in CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;tasonibare&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Dec 2013 20:41:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-need-help-with-configuration/m-p/10455#M7706</guid>
      <dc:creator>tasonibare</dc:creator>
      <dc:date>2013-12-16T20:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - need help with configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-need-help-with-configuration/m-p/10456#M7707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to add, if you need to see DHCP negotiations, allocations and events, you can tail or less the dhcpd for this information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; tail follow yes mp-log dhcpd.log&lt;/P&gt;&lt;P&gt;(for more information, you can also set the dhcpd to debug mode with the 'debug dhcpd global on debug' debug).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.: Always remember to turn off debugging when done troubleshooting so the device doesn't crash on you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;tasonibre&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Dec 2013 20:48:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-need-help-with-configuration/m-p/10456#M7707</guid>
      <dc:creator>tasonibare</dc:creator>
      <dc:date>2013-12-16T20:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal - need help with configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-need-help-with-configuration/m-p/10457#M7708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tasonibre&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AD1. I changed my both CP policies (from WiFi to untrust and WiFi to DMZ_wew) from "default" to http and https&lt;/P&gt;&lt;P&gt;When&amp;nbsp; I try to open http webpage (doesn't matter it's from DMZ or Untrust) it's working prefectly and webbrowser i redirected to CP.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When I try to open &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://paloaltonetworks.com"&gt;https://paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt; I get "The connection was reset&amp;nbsp; The connection to the server was reset while the page was loading." - that's OK - I didn't authorise my session. I have problem when I try to open &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://mywebpage.com"&gt;https://mywebpage.com&lt;/A&gt;&lt;SPAN&gt; (served from DMZ_wew) - the webpage is loading without any problems &lt;/SPAN&gt;&lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where is my problem? I'd like to stop https traffic to DMZ_wew zone in the same way as to Untrust.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need clarification according to same zone traffic. Should I add security policy allowinf same zone traffic or it's not nesssary?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Dec 2013 20:50:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-need-help-with-configuration/m-p/10457#M7708</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-12-17T20:50:40Z</dc:date>
    </item>
  </channel>
</rss>

