- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
02-07-2024 04:10 AM
Hi all,
I would like to know how I would go about creating security policies based of the XFF headers please, any help would be appreciated.
I have read the documentation and I have to enable the XFF header
I need some help after that, so from my understanding this will populate the XFF header, can this be used within the security policy directly? I dont see any option to use XXF as the source IP address under the security policy.
I'm a little unsure of how to use the XFF header to build out a security policy to allow / deny traffic from the true customer source IP address rather than the proxy server address which is sit in between
Kind regards
02-07-2024 01:43 PM
Hello @sxk654 - if I understand correctly, you want to use the X-Forwarded-For header, populated by another device, in your ruleset. Is that correct?
In that case you probably don't want to populate the XFF header, because doing so will add the NGFW's IP address to the XFF header. That is more useful for subsequent downstream devices.
If my assessment of your need is correct, and assuming that your proxy "correctly" fills X-Forwarded-For and you're running PAN-OS 10.x or above, the steps required are as follows. Please note that X-Forwarded-For will only be visible for a subset of your traffic, specifically HTTP and (if you have appropriate decryption policies) HTTPS traffic.
02-08-2024 05:30 AM
Hi & thanks for the detailed reply
Correct, the design at the moment is customer src IP -> Proxy -> Palo
& yes, I'm not interested in passing the Palo IP into the headers for the downstream device but want to build out a security policy to allow traffic from the true customer IP.
At the moment, while looking at the logs, I dont see any actual customer IPs, all source IP belong to the proxy IP addresses subnet, as expected.
From what you are saying, I will need to enable URL Filtering Settings and enable X-Forwarded-For and then assign this to the security policy.
Then edit the security policy and add in the customer's true source IP subnet / IP to the source addess section of the secuirty rule?
Enabling the URL X-Forwarded-For, will then this populate the Monitor tab field with ' X-Fordwarded-For IP ' ?
So that I can see what the true IP is? Also, do you know how to filter the traffic logs to show traffic from a certain customer ? similar to ( addr.src in '1.1.1.1' ) I can't seem to work out the filter for it, something like ( x-forwarded in '2.2.2.2' )
Thanks for your help.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!