<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Geo Blocking problem in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/geo-blocking-problem/m-p/365533#M88577</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;that last response was meant for you. Thanks mate. I keep getting html errors when posting which is quite frustrating.&lt;/P&gt;</description>
    <pubDate>Wed, 25 Nov 2020 14:31:44 GMT</pubDate>
    <dc:creator>Fraz_Mahmud</dc:creator>
    <dc:date>2020-11-25T14:31:44Z</dc:date>
    <item>
      <title>Geo Blocking problem</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/geo-blocking-problem/m-p/365274#M88550</link>
      <description>&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Hi, I am using Palo Alto (PA) firewalls hosting Software Version: 8.1.17 in AWS and need to configure Geo-Blocking so that only GB (United Kingdom) requests are permitted and all other requests denied.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The infrastructure setup is as follows:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;FQDN =&amp;gt; Internet Load Balancer =&amp;gt; Palo Alto =&amp;gt; Internal Load Balancer =&amp;gt; EC2 instance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have set up "security" policy 1 under the "policies" tab with the 2 x source addresses which belong to the subnets attached to the internet load balancer. See below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="security policy source 1.PNG" style="width: 701px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28787i3DB7D5A6A7A712D5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="security policy source 1.PNG" alt="security policy source 1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then set up a second security policy 2 with only "GB" in the source address and enabled the "negate" option (see below). I then placed policy 2 after policy 1 expecting all traffic other than GB to be blocked. This did not work because traffic permitted in rule 1 is obviously forwarding the load balancer IP and not that of the actual source address of the requestor.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="security policy source 2.PNG" style="width: 700px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28788i31B2C5B5426960BD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="security policy source 2.PNG" alt="security policy source 2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is an x-forwarded for option (see below) but do I simply enable both checkboxes? Is there further configuration change required?&amp;nbsp;Any help would be much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PA_1.PNG" style="width: 734px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28789iFCB92280AB78F095/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PA_1.PNG" alt="PA_1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 16:01:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/geo-blocking-problem/m-p/365274#M88550</guid>
      <dc:creator>Fraz_Mahmud</dc:creator>
      <dc:date>2020-11-24T16:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: Geo Blocking problem</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/geo-blocking-problem/m-p/365439#M88559</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163478"&gt;@Fraz_Mahmud&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding Security policy to allow traffic only from GB&amp;nbsp; you can configure this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source region GB&amp;nbsp; and destination address which you want and check they negate and then click on action as drop.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This will block traffic from all other countries other than GB for your destination address.&lt;/P&gt;
&lt;P&gt;After this policy create another policy and put source IP which you want to allow and put the destination ip address which you want and&lt;/P&gt;
&lt;P&gt;action as allow.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2020 03:52:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/geo-blocking-problem/m-p/365439#M88559</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2020-11-25T03:52:41Z</dc:date>
    </item>
    <item>
      <title>Re: Geo Blocking problem</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/geo-blocking-problem/m-p/365442#M88562</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163478"&gt;@Fraz_Mahmud&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You'll want to be running PAN-OS 10 and use the following feature to make this work as best as possible.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/policy/identify-users-connected-through-a-proxy-server/use-xff-values-for-ip-based-security-policy-and-logging.html#ida9a1d4bc-33e5-4ff5-9455-fe2800cb8ff0" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/policy/identify-users-connected-through-a-proxy-server/use-xff-values-for-ip-based-security-policy-and-logging.html#ida9a1d4bc-33e5-4ff5-9455-fe2800cb8ff0&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2020 04:19:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/geo-blocking-problem/m-p/365442#M88562</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-11-25T04:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: Geo Blocking problem</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/geo-blocking-problem/m-p/365531#M88576</link>
      <description>&lt;DIV&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Thanks for the info.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've set up a dummy Palo Alto in a test environment with PAN-OS 10 to check out the options. See below.&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (3).png" style="width: 827px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28803i8C9C87BC97DDD411/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image (3).png" alt="image (3).png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (4).png" style="width: 867px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28804i6CBB3E725E6481DF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image (4).png" alt="image (4).png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I was hoping I wouldn't have to upgrade the PAN-OS but looks like it may be the only solution. So by enabling the x-forwarded for security policy option, it will be at root level on the PA so may affect other rules. I will have to go through all other rules before making changes. It would have been great if you were able to specify explicit security rules to which the x-forwarded option could be explicitly applied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you aware of any breaking changes upgrading from PAN-OS version 8 to 10?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2020 14:33:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/geo-blocking-problem/m-p/365531#M88576</guid>
      <dc:creator>Fraz_Mahmud</dc:creator>
      <dc:date>2020-11-25T14:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: Geo Blocking problem</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/geo-blocking-problem/m-p/365533#M88577</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;that last response was meant for you. Thanks mate. I keep getting html errors when posting which is quite frustrating.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2020 14:31:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/geo-blocking-problem/m-p/365533#M88577</guid>
      <dc:creator>Fraz_Mahmud</dc:creator>
      <dc:date>2020-11-25T14:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: Geo Blocking problem</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/geo-blocking-problem/m-p/365534#M88578</link>
      <description>&lt;P&gt;&lt;BR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help. I'm not entirely sure this will work reflecting on it? The URL that incoming traffic is received via is DNSd to the AWS classic internet load balancer. So all traffic must come via the load balancer, then traverse the Palo Alto and then be blocked if non-GB. That's why the first rule allows all traffic via the load balancer and i set up the second rule to block all non-GB traffic. I may have misunderstood your suggestion so please feel free to correct me. I am in no way a network/firewall expert so open to all suggestions.&amp;nbsp;It would have been easier if i could have blocked all traffic excluding GB at the load balancer.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2020 14:32:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/geo-blocking-problem/m-p/365534#M88578</guid>
      <dc:creator>Fraz_Mahmud</dc:creator>
      <dc:date>2020-11-25T14:32:58Z</dc:date>
    </item>
  </channel>
</rss>

