<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: block non decrypt traffic in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/block-non-decrypt-traffic/m-p/541133#M1219</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;There is some traffic that will break if you try to decrypt it so not decrypting it is the correct path. However I would setup decryption policies and place your decryption policy at the bottom of the Decryption policies, that way you can create 'do not decrypt' policies above that. However by creating the decryption policy, all traffic that matches the policy will be decrypted.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmyCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmyCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Thu, 04 May 2023 21:49:03 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2023-05-04T21:49:03Z</dc:date>
    <item>
      <title>block non decrypt traffic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/block-non-decrypt-traffic/m-p/540972#M1204</link>
      <description>&lt;P&gt;&lt;SPAN class="HwtZe"&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;Hello, I need to know how to block traffic that is not going through decrypt. &lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2023 19:09:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/block-non-decrypt-traffic/m-p/540972#M1204</guid>
      <dc:creator>AlessandroSousa</dc:creator>
      <dc:date>2023-05-03T19:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: block non decrypt traffic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/block-non-decrypt-traffic/m-p/541133#M1219</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;There is some traffic that will break if you try to decrypt it so not decrypting it is the correct path. However I would setup decryption policies and place your decryption policy at the bottom of the Decryption policies, that way you can create 'do not decrypt' policies above that. However by creating the decryption policy, all traffic that matches the policy will be decrypted.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmyCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClmyCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2023 21:49:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/block-non-decrypt-traffic/m-p/541133#M1219</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-05-04T21:49:03Z</dc:date>
    </item>
    <item>
      <title>Re: block non decrypt traffic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/block-non-decrypt-traffic/m-p/541445#M1236</link>
      <description>&lt;P&gt;&lt;SPAN class="HwtZe"&gt;&lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;I had already done that.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;The problem is that the traffic I do NOT want to decrypt is actually an application (google-play), and in the decrypt module/filters (decrypt -&amp;gt; pre -rules) there is no option to insert application in the rule.&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="jCAhz ChMk0b"&gt;&lt;SPAN class="ryNqvb"&gt;This is causing an excessive increase of sessions in my decrypt which in turn is generating high processing in the firewall. In the image I attached, you can see that google-play is going through decrypt and consuming more than 5,000 sessions even though it is blocked in the main table (security rules)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2023 14:18:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/block-non-decrypt-traffic/m-p/541445#M1236</guid>
      <dc:creator>AlessandroSousa</dc:creator>
      <dc:date>2023-05-08T14:18:56Z</dc:date>
    </item>
    <item>
      <title>Re: block non decrypt traffic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/block-non-decrypt-traffic/m-p/541461#M1238</link>
      <description>&lt;P&gt;You often can not determine the application without decrypting the traffic, as the data that would determine the application is within a SSL session. Therefore application is not a valid filter for determining whether to decrypt or not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;According to my PA, the google-play application uses ports tcp/80, 443, 5228, and udp/5228. So option one would be to bypass decryption of traffic to port 5228, though this may not be ideal and may miss a large portion of SSL traffic on port 443. A second option would be to build a URL filter and try to bypass decryption based on that. A bit of Googling indicates that Google Play uses a URL in the format of https://play.google.com/store/xxx, however this may not always be the case as apps/content is frequently mixed across CDNs. So why not try bypassing decryption based on URL and see if that provides enough of a solution.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;Create a new URL Category (Objects-&amp;gt;Custom Objects-&amp;gt;URL Category) for filtering items to be bypassed in decryption. Note that since you are not decrypting, you do not know the entire URL, just the FQDN in the SNI. Therefore you can only filter based on the FQDN portion of the URL: Be sure to terminate your entries correctly to prevent unwanted/unexpected expansion:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px" data-unlink="true"&gt;Name = Do-Not-Decrypt&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px" data-unlink="true"&gt;Type = URL List&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px" data-unlink="true"&gt;Sites =&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px" data-unlink="true"&gt;play.google.com/&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;Then create a decryption bypass rule (Policies-&amp;gt;Decryption):&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px" data-unlink="true"&gt;Name = Do-Not-Decrypt-URL&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px" data-unlink="true"&gt;Src Zone = Trust&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px" data-unlink="true"&gt;Dst Zone = Untrust&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px" data-unlink="true"&gt;URL Category = Do-Not-Decrypt&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px" data-unlink="true"&gt;Action = No Decrypt&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2023 17:06:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/block-non-decrypt-traffic/m-p/541461#M1238</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2023-05-08T17:06:43Z</dc:date>
    </item>
  </channel>
</rss>

