<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Forcing/Redirecting IP addresses to use name in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/forcing-redirecting-ip-addresses-to-use-name/m-p/571650#M2359</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/172132"&gt;@Deena&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Honestly the best way of accomplishing something like this would be to use a custom App-ID for things and only allow that app-id to your external resources. That way you can base the ID off of the http-req-host-header and ssl-req-client-hello and direct IP access would never match and be denied.&lt;/P&gt;
&lt;P&gt;Alternatively if you're good at scripting you could build a custom report and pull it via the API for anything accessing your public IPs directly via URL logs assuming that you're logging that information. Then the script could block the addresses going directly to your IP addresses and not using FQDNs instead.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just be mindful that some services are actually expected to be accessed via the IP address. HIP reports are a prime example of this on GlobalProtect, SMTP traffic as well if you have email on-prem. It's not&amp;nbsp;&lt;EM&gt;inherently&amp;nbsp;&lt;/EM&gt;unexpected for everything to just utilize FQDN instead of the IP address itself, but certainly would be unexpected from web servers and the like.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Jan 2024 22:05:51 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2024-01-03T22:05:51Z</dc:date>
    <item>
      <title>Forcing/Redirecting IP addresses to use name</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/forcing-redirecting-ip-addresses-to-use-name/m-p/571648#M2358</link>
      <description>&lt;P&gt;Hi All, happy new year.&lt;/P&gt;
&lt;P&gt;Is there a way to block or forcing/redirect incoming traffic to an ip address. I would like to block outside attempts from trying to access the network using the ip address instead of the hostname/url.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Appreciate any suggestions and advice.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;
&lt;P&gt;Deena&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2024 21:47:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/forcing-redirecting-ip-addresses-to-use-name/m-p/571648#M2358</guid>
      <dc:creator>Deena</dc:creator>
      <dc:date>2024-01-03T21:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: Forcing/Redirecting IP addresses to use name</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/forcing-redirecting-ip-addresses-to-use-name/m-p/571650#M2359</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/172132"&gt;@Deena&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Honestly the best way of accomplishing something like this would be to use a custom App-ID for things and only allow that app-id to your external resources. That way you can base the ID off of the http-req-host-header and ssl-req-client-hello and direct IP access would never match and be denied.&lt;/P&gt;
&lt;P&gt;Alternatively if you're good at scripting you could build a custom report and pull it via the API for anything accessing your public IPs directly via URL logs assuming that you're logging that information. Then the script could block the addresses going directly to your IP addresses and not using FQDNs instead.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just be mindful that some services are actually expected to be accessed via the IP address. HIP reports are a prime example of this on GlobalProtect, SMTP traffic as well if you have email on-prem. It's not&amp;nbsp;&lt;EM&gt;inherently&amp;nbsp;&lt;/EM&gt;unexpected for everything to just utilize FQDN instead of the IP address itself, but certainly would be unexpected from web servers and the like.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2024 22:05:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/forcing-redirecting-ip-addresses-to-use-name/m-p/571650#M2359</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-01-03T22:05:51Z</dc:date>
    </item>
    <item>
      <title>Re: Forcing/Redirecting IP addresses to use name</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/forcing-redirecting-ip-addresses-to-use-name/m-p/572439#M2403</link>
      <description>&lt;P&gt;Thanks for the suggestion. I'll will look into getting App-ID implemented. Does that require, the PA to decrypt the incoming traffic from the outside zone?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 22:21:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/forcing-redirecting-ip-addresses-to-use-name/m-p/572439#M2403</guid>
      <dc:creator>Deena</dc:creator>
      <dc:date>2024-01-09T22:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: Forcing/Redirecting IP addresses to use name</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/forcing-redirecting-ip-addresses-to-use-name/m-p/572442#M2404</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/172132"&gt;@Deena&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;It's best if you decrypt traffic, but it isn't a requirement. If you're just building a simple app-id signature, doing a pattern-match on the ssl-req-client-hello and matching on the pattern of the hex of the field will work perfectly fine. So as an example if I was building a match for "example.com" the pattern for ssl-req-client-hello would look like what is listed below.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;            &amp;lt;entry name="SSL-Example-Site"&amp;gt;
              &amp;lt;default&amp;gt;
                &amp;lt;port&amp;gt;
                  &amp;lt;member&amp;gt;tcp/80&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;tcp/443&amp;lt;/member&amp;gt;
                &amp;lt;/port&amp;gt;
              &amp;lt;/default&amp;gt;
              &amp;lt;signature&amp;gt;
                &amp;lt;entry name="Host Match"&amp;gt;
                  &amp;lt;and-condition&amp;gt;
                    &amp;lt;entry name="And Condition 1"&amp;gt;
                      &amp;lt;or-condition&amp;gt;
                        &amp;lt;entry name="Or Condition 1"&amp;gt;
                          &amp;lt;operator&amp;gt;
                            &amp;lt;pattern-match&amp;gt;
                              &amp;lt;pattern&amp;gt;\x 6578616d706c652e636f6d \x&amp;lt;/pattern&amp;gt;
                              &amp;lt;context&amp;gt;ssl-req-client-hello&amp;lt;/context&amp;gt;
                            &amp;lt;/pattern-match&amp;gt;
                          &amp;lt;/operator&amp;gt;
                        &amp;lt;/entry&amp;gt;
                      &amp;lt;/or-condition&amp;gt;
                    &amp;lt;/entry&amp;gt;
                  &amp;lt;/and-condition&amp;gt;
                  &amp;lt;scope&amp;gt;protocol-data-unit&amp;lt;/scope&amp;gt;
                  &amp;lt;order-free&amp;gt;no&amp;lt;/order-free&amp;gt;
                &amp;lt;/entry&amp;gt;
              &amp;lt;/signature&amp;gt;
              &amp;lt;subcategory&amp;gt;internet-utility&amp;lt;/subcategory&amp;gt;
              &amp;lt;category&amp;gt;general-internet&amp;lt;/category&amp;gt;
              &amp;lt;technology&amp;gt;browser-based&amp;lt;/technology&amp;gt;
              &amp;lt;risk&amp;gt;1&amp;lt;/risk&amp;gt;
            &amp;lt;/entry&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;Then you can also have a signature to match the http-req-host-header field for non SSL traffic as well, like below:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;            &amp;lt;entry name="Example-Site"&amp;gt;
              &amp;lt;default&amp;gt;
                &amp;lt;port&amp;gt;
                  &amp;lt;member&amp;gt;tcp/443&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;tcp/80&amp;lt;/member&amp;gt;
                &amp;lt;/port&amp;gt;
              &amp;lt;/default&amp;gt;
              &amp;lt;signature&amp;gt;
                &amp;lt;entry name="Host Match"&amp;gt;
                  &amp;lt;and-condition&amp;gt;
                    &amp;lt;entry name="And Condition 1"&amp;gt;
                      &amp;lt;or-condition&amp;gt;
                        &amp;lt;entry name="Or Condition 1"&amp;gt;
                          &amp;lt;operator&amp;gt;
                            &amp;lt;pattern-match&amp;gt;
                              &amp;lt;pattern&amp;gt;example\.com&amp;lt;/pattern&amp;gt;
                              &amp;lt;context&amp;gt;http-req-host-header&amp;lt;/context&amp;gt;
                            &amp;lt;/pattern-match&amp;gt;
                          &amp;lt;/operator&amp;gt;
                        &amp;lt;/entry&amp;gt;
                      &amp;lt;/or-condition&amp;gt;
                    &amp;lt;/entry&amp;gt;
                  &amp;lt;/and-condition&amp;gt;
                  &amp;lt;scope&amp;gt;protocol-data-unit&amp;lt;/scope&amp;gt;
                  &amp;lt;order-free&amp;gt;no&amp;lt;/order-free&amp;gt;
                &amp;lt;/entry&amp;gt;
              &amp;lt;/signature&amp;gt;
              &amp;lt;subcategory&amp;gt;internet-utility&amp;lt;/subcategory&amp;gt;
              &amp;lt;category&amp;gt;general-internet&amp;lt;/category&amp;gt;
              &amp;lt;technology&amp;gt;browser-based&amp;lt;/technology&amp;gt;
              &amp;lt;risk&amp;gt;1&amp;lt;/risk&amp;gt;
            &amp;lt;/entry&amp;gt;
&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;You can use a site like &lt;A href="https://onlinetexttools.com/convert-text-to-hexadecimal" target="_self"&gt;THIS&lt;/A&gt;&amp;nbsp;to get the hex easily. In the example below the only tool options that I leave enabled is the 'Add Zero to Short Values', both 'Separate Hex Values' and 'Add Hex Base Indicator' I personally leave off to avoid character limits and it will still work perfectly fine.&amp;nbsp;&lt;BR /&gt;You could also collapse the signatures together within a single entry if you wanted instead of separating them out to "Example-Site" and "SSL-Example-Site" like I did. I personally like having both because it creates a delimitation, but that's absolutely not required.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 22:36:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/forcing-redirecting-ip-addresses-to-use-name/m-p/572442#M2404</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-01-09T22:36:36Z</dc:date>
    </item>
    <item>
      <title>Re: Forcing/Redirecting IP addresses to use name</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/forcing-redirecting-ip-addresses-to-use-name/m-p/572572#M2411</link>
      <description>&lt;P&gt;As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt; mentioned you can use APP id and match allowed hostname. You can also do threat signature that matches on web or ssl traffic and when hostname or SNI is just present and use the Negate rule match to exclude for example " example\.com" as to not block the valid domain&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/create-a-custom-threat-signature" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/create-a-custom-threat-signature&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/objects/objects-custom-objects/objects-custom-objects-data-patterns/syntax-for-regular-expression-data-patterns" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-web-interface-help/objects/objects-custom-objects/objects-custom-objects-data-patterns/syntax-for-regular-expression-data-patterns&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 16:23:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/forcing-redirecting-ip-addresses-to-use-name/m-p/572572#M2411</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2024-01-10T16:23:30Z</dc:date>
    </item>
  </channel>
</rss>

