<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article How to Block a Specific URL in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/how-to-block-a-specific-url/ta-p/521274</link>
    <description>&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;This article is based on the discussion "&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/cannot-block-theoxymoron-xyz/m-p/520048" target="_blank" rel="noopener"&gt;Cannot block theoxymoron.xyz&lt;/A&gt;," by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/254519"&gt;@Brandon54&lt;/a&gt;&amp;nbsp;and answered by &lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804" target="_blank" rel="noopener"&gt;@Adrian_Jensen&lt;/A&gt; and &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;.&amp;nbsp;Read on to see the discussion and solution!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Hello, I have been trying to block the site theoxymoron.xyz but can not get it to block. I have tried URL filtering with many different versions of the UR, as well as blocking the IP addresses for the site, neither of which worked for me.&amp;nbsp; We do not use decryption. Any help would be appreciated.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Accepted Solution:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Actually, there are many ways to do this. If you are using a Security Policy with a URL Filter policy attached, you can do something like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First you should have an existing Security Policy for your general internet bound traffic. You may want to use the &lt;STRONG&gt;"Test Policy Match"&lt;/STRONG&gt; tool at the bottom of the Security Policy page to verify whether or not traffic is actually using the intended policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The URL Filter must also be something other than "default" as you can not change the default filter categories.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;Policies-&amp;gt;Security&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;name=Internet Access&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;SrcZone=Trust&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;SrcAddr=CorpInternalIPs&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;DstZone=Untrust&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;DstAddr=any&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;Application=any&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;Service=any&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;Action=Allow&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;STRONG&gt;Profile Settings-&amp;gt;URL Filtering=CorpURLFilter&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then create a custom URL Category for all domains you want to block (regardless of their other automatic categorization). The entries should only be the FQDN and possibly a URL path (path will only work if you are doing SSL decryption).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;MARK&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; &lt;EM&gt;Without encryption it can be a bit trickier as you only have the SNI to work off of.&lt;/EM&gt;&lt;/MARK&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The entries should be terminated with a slash or other delimiter to ensure variable expansion doesn't match to unintended paths (see&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000oM79CAE&amp;amp;lang=en_US%E2%80%A9" target="_blank" rel="noopener"&gt;examples of using wildcards in URL filtering profiles&lt;/A&gt;&lt;/STRONG&gt;).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Be sure to add both the root and wildcard server names as the wildcard will not capture the root by itself.&lt;/P&gt;
&lt;P&gt;Don't put http/https specific resource indicators:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;Objects-&amp;gt;Custom Objects-&amp;gt;URL Category&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;name=Corp-Block&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;sites=&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;STRONG&gt;theoxymoron.xyz/&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;STRONG&gt;*.theoxymoron.xyz/&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now in your URL Filtering policy you should see your custom URL Category. Set the Site Access to "block":&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;Objects-&amp;gt;Security Profiles-&amp;gt;URL Filtering&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;name=CorpURLFilter&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;Category=&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;STRONG&gt;ᐁ Custom URL Categories:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;STRONG&gt;Corp-Block=block,block&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;STRONG&gt;...&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;STRONG&gt;ᐁ Predefined Categories&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;STRONG&gt;... whatever your corporate URL categories filtering policies are...&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Your Custom URL Category will override the Predefined Categories settings for anything matching your CorpBlock.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Alternatively, you can block based solely on IP address. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This can be a bit more troublesome as, depending on the hosting, the website may be hosted on more IPs than the PA can track, using fast-flux DNS, may use many FQDN names, or using multiple redirects. This only works when you know the specific FQDN. Unfortunately there isn't a way to wildcard address objects. Start by creating some address objects to block:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;Objects-&amp;gt;Addresses&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;name=theoxymoron-xyz&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;type-&amp;gt;FQDN=theoxymoron.xyz&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;name=www-theoxymoron-xyz&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px" data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;type-&amp;gt;FQDN=&lt;/STRONG&gt;&lt;STRONG&gt;www.theoxmoron.xyz&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now create a new internet-bound rule for the specific destination IPs you want to block. You don't need a URL filtering policy or other attributes on this as you will just be blocking:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;Policies-&amp;gt;Security&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;name=Internet-BlockDestinations&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;SrcZone=Trust&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;SrcAddr=CorpInternalIPs&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;DstZone=Untrust&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;DstAddr=theoxymoron-xzy,www-theoxymoron-xyz&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;Application=any&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;Service=any&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;Action=Block&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Depending on how you have your firewall setup, and your security posture, you may want to use one or another path. I use both of the above methods (and other methods) for various categories of blocking, FQDN/domain based URL Filter based on URL-root names for general websites, Security Policy general blacklists for various other IPs and networks that should never have any traffic http/https or otherwise.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because it's original categorization is &lt;STRONG&gt;'Proxy Avoidance and Anonymizers'&lt;/STRONG&gt;, you can even simply just block this category.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_0-1667424781111.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45104i264BA51FE21551F8/image-size/large?v=v2&amp;amp;px=999" role="button" title="OtakarKlier_0-1667424781111.png" alt="OtakarKlier_0-1667424781111.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;Hope this helps!&lt;/DIV&gt;
&lt;DIV data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Tue, 05 Nov 2024 01:42:09 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2024-11-05T01:42:09Z</dc:date>
    <item>
      <title>How to Block a Specific URL</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/how-to-block-a-specific-url/ta-p/521274</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Tue, 05 Nov 2024 01:42:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/how-to-block-a-specific-url/ta-p/521274</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-11-05T01:42:09Z</dc:date>
    </item>
  </channel>
</rss>

