Can NGFW Block Trafic Depending on the client and source IP

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Can NGFW Block Trafic Depending on the client and source IP

L0 Member

Hello,

We have a requirement to control connections from local virtual machines (VMs) to public endpoints. Specifically, we need to enforce access policies based on:

  • The type of client submitting the request (e.g., web browser vs. desktop tool)
  • The IP address of the VM from which the request originates

 

Is it possible to implement such granular controls? 

Thank you for your insights!

2 accepted solutions

Accepted Solutions

L5 Sessionator

Source IP address is easy, just put that in a security rule.

You should be able to create a custom application with signatures based on header information to identify the type of client. You would just have to inspect the traffic to find something to match that differentiates between browser vs tool.

View solution in original post

L6 Presenter

@rmfalconer  suggestion is good as the User-Agent header can be used in such cases but don't think that this is a good security as there are dedicated WAF systems that use javascripts to verify if a user is bot/tool or web browser like the one in Prisma Cloud product.

 

For custom signatures you can take a look at:

 

How to Write Palo Alto Networks Custom Vulnerability and Application Signatures with Examples | Palo...

View solution in original post

2 REPLIES 2

L5 Sessionator

Source IP address is easy, just put that in a security rule.

You should be able to create a custom application with signatures based on header information to identify the type of client. You would just have to inspect the traffic to find something to match that differentiates between browser vs tool.

L6 Presenter

@rmfalconer  suggestion is good as the User-Agent header can be used in such cases but don't think that this is a good security as there are dedicated WAF systems that use javascripts to verify if a user is bot/tool or web browser like the one in Prisma Cloud product.

 

For custom signatures you can take a look at:

 

How to Write Palo Alto Networks Custom Vulnerability and Application Signatures with Examples | Palo...

  • 2 accepted solutions
  • 583 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!