- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
12-21-2011 07:12 AM
Hi,
I've recently discovered that if a user shares their network connection by setting up an AP on their machine (think Mac 'Sharing') then whatever device is then connected can get online (the deny and allow policies still apply as expected). For example, a connecting iPad gets an address 10.0.0.3/32 from the workstation AP. The workstaion has 192.168.1.5. The Activity logs show the source IP as being 192.168.1.5. Is it possible to block the iPad (or see the 'real' source IP - 10.0.0.3/32). Hope that's clear.
Thanks
Nick
12-21-2011 01:50 PM
The short answer is no, the Mac is NAT'ing the 10.x.x.x network to it's real address of 192.168.x.x. The Palo Alto has no knowledge of this NAT. It only sees the 192.168.x.x address.
You could either secure the Mac desktops to prevent that behavior, or block based on User Agents.
12-21-2011 07:53 AM
You can try this: https://live.paloaltonetworks.com/docs/DOC-1503
12-21-2011 08:09 AM
Thanks for the suggestion, but I don't want to block them, rather restrict tethered devices.
Thanks
12-21-2011 01:50 PM
The short answer is no, the Mac is NAT'ing the 10.x.x.x network to it's real address of 192.168.x.x. The Palo Alto has no knowledge of this NAT. It only sees the 192.168.x.x address.
You could either secure the Mac desktops to prevent that behavior, or block based on User Agents.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!