<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Password protected internal site in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/password-protected-internal-site/m-p/352340#M87170</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/73975"&gt;@Rievax&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;So you've thrown out authentication policies which would generally be the solution for something like this, which really leaves you with licensing GP so you can do a clientless setup to service this resource or having them actually use GlobalProtect to form a VPN connection. You don't really have another option here from the firewall itself.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 26 Sep 2020 05:02:48 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2020-09-26T05:02:48Z</dc:date>
    <item>
      <title>Password protected internal site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/password-protected-internal-site/m-p/352190#M87150</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to migrate a rule of an ancient firewall (Microsoft ISA server) that was "publishing" an internal resource using regular HTTP - just a web page - but protected by an RSA SecurID login page. The ISA / RSA implementation was just enforcing a login page before showing up the published Web site:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;External User (Internet)&amp;nbsp; ---&amp;gt;&amp;nbsp; &amp;nbsp;ISA Server with RSA SecureID auth ---&amp;gt;&amp;nbsp; HTTP/80 web site (LAN)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On my PA, I have no specific license for GP so I cannot use the GP clientless functionality.&lt;/P&gt;&lt;P&gt;Creating an enabling User-ID / Captive Portal / legacy RSA SecureID for the Internet Zone is a no no...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are there anything I could do on the PA side to enforce authentication for Internet users?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;R.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Sep 2020 16:58:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/password-protected-internal-site/m-p/352190#M87150</guid>
      <dc:creator>Rievax</dc:creator>
      <dc:date>2020-09-25T16:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: Password protected internal site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/password-protected-internal-site/m-p/352340#M87170</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/73975"&gt;@Rievax&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;So you've thrown out authentication policies which would generally be the solution for something like this, which really leaves you with licensing GP so you can do a clientless setup to service this resource or having them actually use GlobalProtect to form a VPN connection. You don't really have another option here from the firewall itself.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Sep 2020 05:02:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/password-protected-internal-site/m-p/352340#M87170</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-09-26T05:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: Password protected internal site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/password-protected-internal-site/m-p/352395#M87179</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/73975"&gt;@Rievax&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well the captive portal will "enforce authentication for internet users" as per your requirements. Why is this not option for you?&lt;/P&gt;</description>
      <pubDate>Sun, 27 Sep 2020 07:49:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/password-protected-internal-site/m-p/352395#M87179</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2020-09-27T07:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: Password protected internal site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/password-protected-internal-site/m-p/352464#M87193</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dear all. Thanks for your answers!&lt;/P&gt;&lt;P&gt;To be honest, I was reading the &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVPCA0" target="_blank" rel="noopener"&gt;Best Practices article&lt;/A&gt; for securing User-ID and in many other places in PA doc, they warn not to enable User-ID in Internet / Untrusted zones. Having a closer look, the possible issue seems to be related more in regards to WMI probing (which is not enabled in my case)... Brute force attack should not be a problem since this is an OTP SecurID access that I would use in my Authentication Policy rule (BTY, I tested in from a DMZ zone, and I know that works fine).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still, by reading your answers, this does not seems to be a problem to your eyes enabling User-ID in the Internet / Untrusted zone. Or I am mistaken, and there is another way to have an attached Authentication Policy Rule without enabling User-ID for the Zone?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My second issue is regarding the Captive Portal Redirect Host and SSL Service Profile... I originally built it for "Internal" use, and because there's only one Captive Portal setup I will have to re-create a proper Redirect Host / SSL Service Profile / Split DNS setup to have it accessible internally and externally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for your suggestions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;R.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 11:49:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/password-protected-internal-site/m-p/352464#M87193</guid>
      <dc:creator>Rievax</dc:creator>
      <dc:date>2020-09-28T11:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: Password protected internal site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/password-protected-internal-site/m-p/353152#M87288</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Using User-ID wont work, the reason is if the firewall knows the user-ip already, it will not bring up the authentication page. So I agree with BPry and you have to license GP is you want to use the PAN or find another solution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 21:59:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/password-protected-internal-site/m-p/353152#M87288</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-09-30T21:59:45Z</dc:date>
    </item>
  </channel>
</rss>

