<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL Category behavior with rule match condition question in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-category-behavior-with-rule-match-condition-question/m-p/554475#M1751</link>
    <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206916"&gt;@Josh_Morris&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I assume you've configured the security policy actions, setting them to 'log at session start' and 'log at session end'.&lt;/P&gt;
&lt;P&gt;When dealing with a security policy where the application is set to 'any', it's possible that a higher volume of traffic will initially hit this policy during session setup. This traffic will be logged based on your security policy's specified log settings. Subsequently, as the application becomes identified (due to application-shift), a policy lookup occurs again to match the traffic against a more specific policy. If no policy is defined to allow the specific application at this point, the traffic will be denied.&lt;/P&gt;
&lt;P&gt;In your particular scenario, you've included a custom URL profile in the security policy's service/URL section. This inclusion permits traffic toward the specific URL you've defined within the service/URL section. The logs you're observing might be somewhat misleading due to the way Palo Alto firewall policy lookup functions. To address this, you could consider reconfiguring the security policy to log traffic solely at 'session end'. This approach would display only the logs that successfully matched the security policy by the end of the session.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These security policy logs will appear in URL filtering logs if the security policy action is set to 'deny'.&lt;/P&gt;
&lt;P&gt;I've provided a link below for further reference:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKvCAK" target="_new"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKvCAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this explanation proves helpful&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 21 Aug 2023 08:21:30 GMT</pubDate>
    <dc:creator>akuzhuppilly</dc:creator>
    <dc:date>2023-08-21T08:21:30Z</dc:date>
    <item>
      <title>URL Category behavior with rule match condition question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-category-behavior-with-rule-match-condition-question/m-p/554235#M1748</link>
      <description>&lt;P&gt;I came across behavior that confused and concerned me recently. I had a test rule with the following conditions set:&lt;/P&gt;
&lt;P&gt;Source Zone (LAN)&lt;/P&gt;
&lt;P&gt;Source user&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Destination Zone (WAN)&lt;/P&gt;
&lt;P&gt;Application (ANY)&lt;/P&gt;
&lt;P&gt;URL Category (not in Profile/Action section, but in Service/URL section)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was under the understanding that the URL Category is part of the match condition when placed in the Service/URL section (and therefore impacts logging visibility), however when testing this the actual behavior showed otherwise. Traffic logs for this rule showed it was matching ANY application and web traffic without regard to the URL Category.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I then looked up and found this &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWZCA0" target="_self"&gt;KB article&lt;/A&gt; with the following comment:&lt;/P&gt;
&lt;H3&gt;&lt;EM&gt;&lt;STRONG&gt;URL categories in security policies&lt;/STRONG&gt;&lt;/EM&gt;&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;In the above example, Rule Y is configured to block adult category websites using the URL category option present in the security policies. &lt;STRONG&gt;Web-browsing application must be explicitly mentioned in the policies when using the URL category option in the security policies. Otherwise, irrelevant traffic with match this rule.&lt;/STRONG&gt; Another way of controlling websites based on URL categories is to use URL filtering profiles.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tested this by setting the application to &lt;EM&gt;web-browsing&lt;/EM&gt; only, and &lt;EM&gt;web-browsing&lt;/EM&gt; &amp;amp; &lt;EM&gt;SSL&lt;/EM&gt;. This appears to be correct where if there's any application traffic that is allowed other than just &lt;EM&gt;web-browsing&lt;/EM&gt;, the URL Category in the security rule is essentially useless and the rule allows all traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can anyone explain how this is the case? Even if SSL was allowed in Application (which most web browsing traffic is these days), that renders the ability to have a rule match condition using a custom URL Category useless! I'm at a loss here as to how this can be.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 02:55:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-category-behavior-with-rule-match-condition-question/m-p/554235#M1748</guid>
      <dc:creator>Josh_Morris</dc:creator>
      <dc:date>2023-08-18T02:55:43Z</dc:date>
    </item>
    <item>
      <title>Re: URL Category behavior with rule match condition question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-category-behavior-with-rule-match-condition-question/m-p/554475#M1751</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206916"&gt;@Josh_Morris&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I assume you've configured the security policy actions, setting them to 'log at session start' and 'log at session end'.&lt;/P&gt;
&lt;P&gt;When dealing with a security policy where the application is set to 'any', it's possible that a higher volume of traffic will initially hit this policy during session setup. This traffic will be logged based on your security policy's specified log settings. Subsequently, as the application becomes identified (due to application-shift), a policy lookup occurs again to match the traffic against a more specific policy. If no policy is defined to allow the specific application at this point, the traffic will be denied.&lt;/P&gt;
&lt;P&gt;In your particular scenario, you've included a custom URL profile in the security policy's service/URL section. This inclusion permits traffic toward the specific URL you've defined within the service/URL section. The logs you're observing might be somewhat misleading due to the way Palo Alto firewall policy lookup functions. To address this, you could consider reconfiguring the security policy to log traffic solely at 'session end'. This approach would display only the logs that successfully matched the security policy by the end of the session.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These security policy logs will appear in URL filtering logs if the security policy action is set to 'deny'.&lt;/P&gt;
&lt;P&gt;I've provided a link below for further reference:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKvCAK" target="_new"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKvCAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this explanation proves helpful&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 08:21:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-category-behavior-with-rule-match-condition-question/m-p/554475#M1751</guid>
      <dc:creator>akuzhuppilly</dc:creator>
      <dc:date>2023-08-21T08:21:30Z</dc:date>
    </item>
  </channel>
</rss>

