Greetings,
I am planning to enable the Threat Prevention app for one of my schools, however the testing I did first revealed that the IPs of some residential connections were randomly being blocked from the websites that are hosted on-prem. I asked this question during a Brighttalk webinar about Threat Prevention, and two rules were shown to create: using the public IP as both the destination and source address. This is a problem since the public IP is the address of my External interface.
If I pass traffic to and from that IP, then won't I essentially nullify Threat Prevention? Should I instead use the internal IPs of these servers? Or should I use the HTTP Hostname variable and enter in the domain of the website that my servers are hosting?
Thank you for your advice!
I am planning to enable the Threat Prevention app for one of my schools, however the testing I did first revealed that the IPs of some residential connections were randomly being blocked from the websites that are hosted on-prem. I asked this question during a Brighttalk webinar about Threat Prevention, and two rules were shown to create: using the public IP as both the destination and source address. This is a problem since the public IP is the address of my External interface.
If I pass traffic to and from that IP, then won't I essentially nullify Threat Prevention? Should I instead use the internal IPs of these servers? Or should I use the HTTP Hostname variable and enter in the domain of the website that my servers are hosting?
Thank you for your advice!
Comment