Block Vpn

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Block Vpn

L4 Transporter

Hi,

How to block ssl vpn and  ipsec vpn going from trust to untrust .

 

I suspect few users are using  like free vpn services like  tunnel beer and hola vpn .

 

How can i  search those users  from palo alto log.

 

Some users are connected from inside to outside world (for official purpose ) using cisco anyconnect (ssl ) and ipsec .And i don't want revoke their permission . ( I need only monitor those users ) 

 

Thanks

 

 

 

 

Thanks

2 accepted solutions

Accepted Solutions

Cyber Elite
Cyber Elite

Hi Sib

 

as it's pretty difficult to differentiate between good and bad ipsec, i would recommend creating security policy based on user instead so you can allow certain users to have vpn tunnels while denying everyone else

 

please take a look at this article: Getting Started: User-ID

 

To be able to identify the different applications used you will need to enable ssl decryption: SSL decryption resource list

 

 

lastly, to control all vpn/encrypted tunnel applications, you can create a behavior based application group (called an application filter) which will automatically contain all applications that create encrypted tunnels, and use that in a security policy to control access to these applications

 

application filter

 

 

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

View solution in original post

L7 Applicator

You should consider deploying a url filter that has the category for proxy avoidance/ anonymizers blocked.  This category is designed to block the activity you describe.

 

 

Steve Puluka BSEET - IP Architect - DQE Communications (Metro Ethernet/ISP)
ACE PanOS 6; ACE PanOS 7; ASE 3.0; PSE 7.0 Foundations & Associate in Platform; Cyber Security; Data Center

View solution in original post

2 REPLIES 2

Cyber Elite
Cyber Elite

Hi Sib

 

as it's pretty difficult to differentiate between good and bad ipsec, i would recommend creating security policy based on user instead so you can allow certain users to have vpn tunnels while denying everyone else

 

please take a look at this article: Getting Started: User-ID

 

To be able to identify the different applications used you will need to enable ssl decryption: SSL decryption resource list

 

 

lastly, to control all vpn/encrypted tunnel applications, you can create a behavior based application group (called an application filter) which will automatically contain all applications that create encrypted tunnels, and use that in a security policy to control access to these applications

 

application filter

 

 

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

L7 Applicator

You should consider deploying a url filter that has the category for proxy avoidance/ anonymizers blocked.  This category is designed to block the activity you describe.

 

 

Steve Puluka BSEET - IP Architect - DQE Communications (Metro Ethernet/ISP)
ACE PanOS 6; ACE PanOS 7; ASE 3.0; PSE 7.0 Foundations & Associate in Platform; Cyber Security; Data Center
  • 2 accepted solutions
  • 3709 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!