Palo Alto Firewall
Configuration Steps
1. Identify GPT Enterprise Traffic
First, create an application filter or custom application to identify OpenAI/GPT Enterprise traffic:
GPT Enterprise typically uses
*.openai.comand*.azure.com(for Azure OpenAI)You may need to create a custom App-ID or use URL filtering categories
2. Configure ICAP Server Profile
In your Palo Alto firewall:
Navigate to Objects > Security Profiles > ICAP Server
Create a new ICAP server profile pointing to your Docker container's IP and port (typically port 1344)
Configure the ICAP URI path (e.g.,
/requestand/response)
3. Create a Data Filtering Profile
Go to Objects > Security Profiles > Data Filtering
Create a profile that uses your ICAP server for inspection
Configure it to inspect both request and response traffic
4. Apply to Security Policy
Create or modify a security policy rule:
Source: Your internal zones/users
Destination: External zone
Application: OpenAI/GPT Enterprise (custom app or URL category)
Action: Allow
Profile Settings: Attach your Data Filtering profile with ICAP
5. SSL Decryption (Critical)
Since GPT Enterprise uses HTTPS, you'll need SSL decryption:
Create an SSL decryption policy to decrypt traffic to
*.openai.comUse forward proxy with appropriate certificates
This is essential for ICAP to inspect the actual payloads
Key Considerations
Performance: ICAP inspection adds latency - ensure your Docker container has adequate resources
Certificate Trust: Deploy your SSL decryption certificate to client machines
Bypass Rules: Consider bypass rules for non-sensitive traffic to reduce load
High Availability: Consider running multiple ICAP server instances
Last updated