<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How Do You Authenticate Users From Specific IP Ranges for Admin Device Access? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-you-authenticate-users-from-specific-ip-ranges-for-admin/m-p/305776#M79476</link>
    <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/74884"&gt;@BatD&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your time to response. I am currently asking for alternative methods for limiting access that do not include global protect. I will modify my original ask to make sure that was clear.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 06 Jan 2020 17:06:01 GMT</pubDate>
    <dc:creator>blwavg</dc:creator>
    <dc:date>2020-01-06T17:06:01Z</dc:date>
    <item>
      <title>How Do You Authenticate Users From Specific IP Ranges for Admin Device Access?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-you-authenticate-users-from-specific-ip-ranges-for-admin/m-p/305678#M79445</link>
      <description>&lt;P&gt;Palo Alto integrates with a number of products; which usually require specific user accounts on the firewall. If your firewall has management access exposed to the internet all of the accounts can be used to log into the firewall. Would it be possible to limit device management for certain users access to specific subnets, such as RFC 1918?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example 1: Joe can log in an manage the firewall from inside the network and from the internet. Sally can only manage the firewall from the 10.10.10.0/24 network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example 2: Joe_Admin has admin device access on the internal network. Joe logs in externally as Joe_RO which has read only access externally while Joe cannot login as Joe_Admin externally.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The end goal is to limit the accounts exposed to the internet. I do understand it would be possible not expose external access and use Global Protect&amp;nbsp; (client and clientless) to to login from an internal subnet, but that is not currently an option.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Jan 2020 18:53:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-you-authenticate-users-from-specific-ip-ranges-for-admin/m-p/305678#M79445</guid>
      <dc:creator>blwavg</dc:creator>
      <dc:date>2020-01-05T18:53:56Z</dc:date>
    </item>
    <item>
      <title>Re: How Do You Authenticate Users From Specific IP Ranges for Admin Device Access?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-you-authenticate-users-from-specific-ip-ranges-for-admin/m-p/305735#M79463</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/33204"&gt;@blwavg&lt;/a&gt;&amp;nbsp;You answered the question in your description, this can easily be achieved by using Global Protect and you shlould never really be exposing unprotected admin access to internet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;If you are using UserID and dynamic admin authentication, you can potentially create granular access policies for the internal network as you described. However you cannot do it from internet, as the firewall will need to know the user to ip mapping for the specific admin and the Internet admin can have any IP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2020 09:36:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-you-authenticate-users-from-specific-ip-ranges-for-admin/m-p/305735#M79463</guid>
      <dc:creator>BatD</dc:creator>
      <dc:date>2020-01-06T09:36:38Z</dc:date>
    </item>
    <item>
      <title>Re: How Do You Authenticate Users From Specific IP Ranges for Admin Device Access?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-you-authenticate-users-from-specific-ip-ranges-for-admin/m-p/305776#M79476</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/74884"&gt;@BatD&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your time to response. I am currently asking for alternative methods for limiting access that do not include global protect. I will modify my original ask to make sure that was clear.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2020 17:06:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-you-authenticate-users-from-specific-ip-ranges-for-admin/m-p/305776#M79476</guid>
      <dc:creator>blwavg</dc:creator>
      <dc:date>2020-01-06T17:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: How Do You Authenticate Users From Specific IP Ranges for Admin Device Access?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-you-authenticate-users-from-specific-ip-ranges-for-admin/m-p/305809#M79481</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/33204"&gt;@blwavg&lt;/a&gt;&amp;nbsp;The users need to be identified somehow at policy level, and the other option is to use Authentication Policy (preciously known as Captive Portal) &amp;nbsp;to grant access to the firewall management. This will allow you to configure very granular control of which use can manage the firewall from particular subnet.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2020 23:18:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-you-authenticate-users-from-specific-ip-ranges-for-admin/m-p/305809#M79481</guid>
      <dc:creator>BatD</dc:creator>
      <dc:date>2020-01-06T23:18:37Z</dc:date>
    </item>
  </channel>
</rss>

