- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
04-03-2019 01:00 PM
Good afternoon
I'm hoping someone might have an answer for me. I'm trying to see if there is a way to block any traffic coming from a Student IPad or Laptop when they try and use a VPN Client or more so a VPN Add-On in Firefox or Chrome. I'm hoping there is a way on the firewall that it can detect that the client is using some type of VPN and it will block that traffic. Thanks for any help in this issue.
04-03-2019 05:28 PM
I imagine these are mostly web-based if they're a plugin. Beyond enforcing what plugins users could install outside the firewall, you could use URL filtering to specfically allow the sites necessary. Additionally alerting on all categories and then blocking what you'd like to accordingly is also an option.
There are various app-ID's for different VPN's like you've described if you know specifically what you're trying to enforce that you could also leverage.
04-04-2019 02:31 PM
Hello,
First you will want to perform SSL decryption. This way you have visibility into these tunneling applications. We have a DENY all policy and allow by exception. Meaning if we dont allow the application at layer7 the app never makes it through. However THere is a list of applications that do vpn connections (currently at 65), just filter for 'encrypted-tunnel'. Just make sure you dont break something that is currently allowed.
Hope that helps.
04-12-2019 06:10 AM
Decryption is the ultimate solution, but there are other things you can do.
For Windows domain-joined, use the Google schema add-on, you can whitelist approved extensions in Chrome and IE which will knock down a good chunk of offenders. The rest will go to Firefox, or chromium, or Brave, or WebDiscovery Browser, or..., in which case you'll need a group policy and/or a way to block those executables. I see Firefox with Zenmate used mostly.
Students will rdp to their home networks, or even a hosted server, so see if you are allowing rdp externally.
For other devices, it depends if you manage them with a central tool designed for client management. If you do, there should be similar ways to do the above. For BYOD you can run a report on the firewall for vpn/anonymous proxy hits and using a script mass-block the devices in your wifi controller. This can get the word out that IT means business.
I'd also suggust adding to your 'anonymous' tips form (like schoolmessenger) the subject, 'network use violation' or similar. That, along with some face time in front of students to address their responsibility as digital citizens of your network can cut down on vpn activity. The fact is, kids don't think they're doing anything bad (wrong, yes), once they're confronted with the seriousness of violating this policy most will get it.
I could go on...
04-25-2019 05:02 AM
You might need to rethink is it essential to block VPN's as Netflix does the same thing to block IP addresses accessing through VPN's. But the internet community came with a solution to overcome it. As a result, you will find that people have found ways to bypass the VPN ban by using Australia based VPNs, smart DNS server, or Personal Cloud VPN. So at least be cautious to close all the possible ways from accessing through VPN's.
07-27-2020 04:17 AM
There are so many different VPN apps it is hardly to imagine a software that will be able to indicate all devices using VPN and even with installing such a soft type situation will hardly be solved.
Walter Harris
Access path: https://live.paloaltonetworks.com/t5/general-topics/ https://www.writemyessayfast.ca
07-27-2020 08:17 PM
My recommendation is that you do 4 things.
1) Block application 'quic' at the top of your policy set.
2) Find a way to force students to deploy your Trusted root CA certificate for decryption, and implement SSL Decryption
3) Create an Application Filter with CATEGORY: networking and SUBCATEGORY: encrypted-tunnel, and proxy. Then define the Application Filter as an application in a 'deny' Security Policy rule.
4) Add an URL Filtering profile to your 'allow' Security Policy rule that has the URL Category proxy-avoidance-and-anonymizers set to 'block'.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!