- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
03-14-2016 05:43 PM - edited 03-14-2016 06:08 PM
Hi,
How to block ssl vpn and ipsec vpn going from trust to untrust .
I suspect few users are using like free vpn services like tunnel beer and hola vpn .
How can i search those users from palo alto log.
Some users are connected from inside to outside world (for official purpose ) using cisco anyconnect (ssl ) and ipsec .And i don't want revoke their permission . ( I need only monitor those users )
Thanks
Thanks
03-15-2016 01:58 AM
Hi Sib
as it's pretty difficult to differentiate between good and bad ipsec, i would recommend creating security policy based on user instead so you can allow certain users to have vpn tunnels while denying everyone else
please take a look at this article: Getting Started: User-ID
To be able to identify the different applications used you will need to enable ssl decryption: SSL decryption resource list
lastly, to control all vpn/encrypted tunnel applications, you can create a behavior based application group (called an application filter) which will automatically contain all applications that create encrypted tunnels, and use that in a security policy to control access to these applications
03-15-2016 03:14 AM
You should consider deploying a url filter that has the category for proxy avoidance/ anonymizers blocked. This category is designed to block the activity you describe.
03-15-2016 01:58 AM
Hi Sib
as it's pretty difficult to differentiate between good and bad ipsec, i would recommend creating security policy based on user instead so you can allow certain users to have vpn tunnels while denying everyone else
please take a look at this article: Getting Started: User-ID
To be able to identify the different applications used you will need to enable ssl decryption: SSL decryption resource list
lastly, to control all vpn/encrypted tunnel applications, you can create a behavior based application group (called an application filter) which will automatically contain all applications that create encrypted tunnels, and use that in a security policy to control access to these applications
03-15-2016 03:14 AM
You should consider deploying a url filter that has the category for proxy avoidance/ anonymizers blocked. This category is designed to block the activity you describe.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!