User-ID Proof Of Concept - With Proxy

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

User-ID Proof Of Concept - With Proxy

L2 Linker

Good afternoon Team,

 

Pardon my stupidity here. I'm running a PoC at the minute and customer is keen on the User-ID aspect. However, the have most of their users behind a proxy.

 

We have configured the PoC in standard TAP, with LDAP server profile etc etc.

 

We are picking up users in logs from AD but I'm wondering if there is a way to see users behind proxy as oppose to the proxy ip address.

 

Obviously I can tell them that we'd remove the proxy and employ URL Filtering should they purchase the device but would really like for them to see traffic logs with users populated.

 

Thank you for all and any advice

1 accepted solution

Accepted Solutions

Cyber Elite
Cyber Elite

If you open URL Filtering profile there is "URL Filtering Settings" tab.
Last option is "X-Forwarded-For"
If you check it then Palo will capture real source IP from the http session and log it.
Proxy must add X-Forwarded-For to the traffic and unless you decrypt ssl you see this only for http sessions not https. You would need to be inline with vwire to decrypt.

 

Maybe they can switch proxy to transparent mode.

 

Also if you don't want to expose internal IPs then would be nice to strip this information after it passes Palo.

Device > Setup > Content-ID > X-Forwarded-For Headers > Strip X-Forwarded-For Header
Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

View solution in original post

2 REPLIES 2

Cyber Elite
Cyber Elite

If you open URL Filtering profile there is "URL Filtering Settings" tab.
Last option is "X-Forwarded-For"
If you check it then Palo will capture real source IP from the http session and log it.
Proxy must add X-Forwarded-For to the traffic and unless you decrypt ssl you see this only for http sessions not https. You would need to be inline with vwire to decrypt.

 

Maybe they can switch proxy to transparent mode.

 

Also if you don't want to expose internal IPs then would be nice to strip this information after it passes Palo.

Device > Setup > Content-ID > X-Forwarded-For Headers > Strip X-Forwarded-For Header
Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

Yes they are using a Cisco WSA.

 

I may ask if they can enable XFF on the proxy, then I will enable XFF in the URL Filtering and Content-ID tabs.

 

We don't really want to place the device inline and perform SSL Decryption.

 

Customer is eager to see User-ID in action so hopefully the XFF option will help us alot.

 

Appreciate the input.

  • 1 accepted solution
  • 4683 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!