<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: F5 Loadbalancer/Authorized Networks/ RDS Gateway in Policy &amp; Access Control</title>
    <link>https://community.cisco.com/t5/policy-access-control/f5-loadbalancer-authorized-networks-rds-gateway/m-p/4880880#M190</link>
    <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Thanks DUOKristina for your response.&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Wed, 27 Jun 2018 14:55:57 GMT</pubDate>
    <dc:creator>jholly</dc:creator>
    <dc:date>2018-06-27T14:55:57Z</dc:date>
    <item>
      <title>F5 Loadbalancer/Authorized Networks/ RDS Gateway</title>
      <link>https://community.cisco.com/t5/policy-access-control/f5-loadbalancer-authorized-networks-rds-gateway/m-p/4880875#M185</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Has anyone had problems configuring Authorized Networks in DUO when the RDS Gateway is behind a F5 Loadbalancer?&lt;/P&gt;
&lt;P&gt;Because the F5 loadbalancer is proxying the connection between the user and the RDS Gateway. DUO only sees the IP address of the F5 loadbalancer in the DUO logs.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 06 Jun 2018 15:14:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/policy-access-control/f5-loadbalancer-authorized-networks-rds-gateway/m-p/4880875#M185</guid>
      <dc:creator>jholly</dc:creator>
      <dc:date>2018-06-06T15:14:44Z</dc:date>
    </item>
    <item>
      <title>Re: F5 Loadbalancer/Authorized Networks/ RDS Gateway</title>
      <link>https://community.cisco.com/t5/policy-access-control/f5-loadbalancer-authorized-networks-rds-gateway/m-p/4880876#M186</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;I would be interested to know the answer to this as well. Same configuration except we use Kemp LBs.&lt;/P&gt;
&lt;P&gt;We have our LBs and gateway in a DMZ. The session hosts are in a different subnet. We are trialling the Duo Remote desktop app install on all session hosts. We have whitelisted the internal LAN but not the DMZ. This means internal users dont get 2FA’d but external users via the gateway do.&lt;/P&gt;
&lt;P&gt;Still in trial phase at the moment…&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 07 Jun 2018 06:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/policy-access-control/f5-loadbalancer-authorized-networks-rds-gateway/m-p/4880876#M186</guid>
      <dc:creator>17G</dc:creator>
      <dc:date>2018-06-07T06:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: F5 Loadbalancer/Authorized Networks/ RDS Gateway</title>
      <link>https://community.cisco.com/t5/policy-access-control/f5-loadbalancer-authorized-networks-rds-gateway/m-p/4880877#M187</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Duo for RDG does not utilize the host name or IP from &lt;CODE&gt;x-forwarded-for&lt;/CODE&gt; as the client IP. Please contact Duo Support, your CSM, or your AE to open a feature request for this.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 08 Jun 2018 14:55:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/policy-access-control/f5-loadbalancer-authorized-networks-rds-gateway/m-p/4880877#M187</guid>
      <dc:creator>DuoKristina</dc:creator>
      <dc:date>2018-06-08T14:55:48Z</dc:date>
    </item>
    <item>
      <title>Re: F5 Loadbalancer/Authorized Networks/ RDS Gateway</title>
      <link>https://community.cisco.com/t5/policy-access-control/f5-loadbalancer-authorized-networks-rds-gateway/m-p/4880878#M188</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Thanks for update Kristina.&lt;/P&gt;
&lt;P&gt;Would you recommend going around the f5 to get Authorized locations to work?&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 08 Jun 2018 16:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/policy-access-control/f5-loadbalancer-authorized-networks-rds-gateway/m-p/4880878#M188</guid>
      <dc:creator>jholly</dc:creator>
      <dc:date>2018-06-08T16:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: F5 Loadbalancer/Authorized Networks/ RDS Gateway</title>
      <link>https://community.cisco.com/t5/policy-access-control/f5-loadbalancer-authorized-networks-rds-gateway/m-p/4880879#M189</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;If you want the Authorized Networks feature to work reliably with Duo for RDG then the client IP received at the RDG server needs to be the actual client IP (which would likely be accomplished by bypassing your load balancer).&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 13 Jun 2018 13:43:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/policy-access-control/f5-loadbalancer-authorized-networks-rds-gateway/m-p/4880879#M189</guid>
      <dc:creator>DuoKristina</dc:creator>
      <dc:date>2018-06-13T13:43:42Z</dc:date>
    </item>
    <item>
      <title>Re: F5 Loadbalancer/Authorized Networks/ RDS Gateway</title>
      <link>https://community.cisco.com/t5/policy-access-control/f5-loadbalancer-authorized-networks-rds-gateway/m-p/4880880#M190</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Thanks DUOKristina for your response.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 27 Jun 2018 14:55:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/policy-access-control/f5-loadbalancer-authorized-networks-rds-gateway/m-p/4880880#M190</guid>
      <dc:creator>jholly</dc:creator>
      <dc:date>2018-06-27T14:55:57Z</dc:date>
    </item>
  </channel>
</rss>

