<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Custom URL category with directories in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/custom-url-category-with-directories/m-p/571824#M2369</link>
    <description>&lt;P&gt;I have a similar issue where I have a rule that I'm trying to limit allowed traffic with custom URL category that includes 3 hostnames with wildcards. The rule is hit when the traffic hits 2 of the hostnames but my third entry (*.amazonaws.com) keeps hitting the default rules. What's interesting is that in the monitor tab, if I click the "resolve hostnames" checkbox, the traffic for 2 hostnames that do work wont resolve while the traffic that hits the default resolves to the amazonaws host.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thoughts?&lt;/P&gt;</description>
    <pubDate>Thu, 04 Jan 2024 20:54:07 GMT</pubDate>
    <dc:creator>LBSalvat</dc:creator>
    <dc:date>2024-01-04T20:54:07Z</dc:date>
    <item>
      <title>Custom URL category with directories</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/custom-url-category-with-directories/m-p/568143#M2202</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;
&lt;P&gt;I am trying to create a custom url category to allow only these (&lt;A href="https://s3.amazonaws.com/icount-pdfs/57764_25566fbb6fd6bbab6b0f35eba91bb55e.pdf" target="_blank"&gt;s3.amazonaws.com/icount-pdfs&lt;/A&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;example:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://s3.amazonaws.com/icount-pdfs/57764_25566fbb6fd6bbab6b0f35eba91bb55e.pdf" target="_blank"&gt;https://s3.amazonaws.com/icount-pdfs/57764_25566fbb6fd6bbab6b0f35eba91bb55e.pdf?&lt;/A&gt;17016197031&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i have tried:&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://s3.amazonaws.com/icount-pdfs/57764_25566fbb6fd6bbab6b0f35eba91bb55e.pdf" target="_blank"&gt;s3.amazonaws.com/icount-pdfs/&lt;/A&gt;*&lt;/P&gt;
&lt;P&gt;&lt;A href="https://s3.amazonaws.com/icount-pdfs/57764_25566fbb6fd6bbab6b0f35eba91bb55e.pdf" target="_blank"&gt;s3.amazonaws.com/icount-pdfs&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://s3.amazonaws.com/icount-pdfs/57764_25566fbb6fd6bbab6b0f35eba91bb55e.pdf" target="_blank"&gt;s3.amazonaws.com/icount-pdfs/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;None of these works.&lt;/P&gt;
&lt;P&gt;ideas?&lt;/P&gt;</description>
      <pubDate>Sun, 03 Dec 2023 16:17:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/custom-url-category-with-directories/m-p/568143#M2202</guid>
      <dc:creator>chens</dc:creator>
      <dc:date>2023-12-03T16:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: Custom URL category with directories</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/custom-url-category-with-directories/m-p/568241#M2209</link>
      <description>&lt;P&gt;You should be able to create a single custom URL category to match that:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;s3.amazonaws.com/icount-pdfs/&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Though note you will have to be doing SSL decryption to identify that path as the PA can't see the actual path unless the SSL/TLS is decrypted.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Dec 2023 18:18:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/custom-url-category-with-directories/m-p/568241#M2209</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2023-12-04T18:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: Custom URL category with directories</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/custom-url-category-with-directories/m-p/571824#M2369</link>
      <description>&lt;P&gt;I have a similar issue where I have a rule that I'm trying to limit allowed traffic with custom URL category that includes 3 hostnames with wildcards. The rule is hit when the traffic hits 2 of the hostnames but my third entry (*.amazonaws.com) keeps hitting the default rules. What's interesting is that in the monitor tab, if I click the "resolve hostnames" checkbox, the traffic for 2 hostnames that do work wont resolve while the traffic that hits the default resolves to the amazonaws host.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thoughts?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2024 20:54:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/custom-url-category-with-directories/m-p/571824#M2369</guid>
      <dc:creator>LBSalvat</dc:creator>
      <dc:date>2024-01-04T20:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: Custom URL category with directories</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/custom-url-category-with-directories/m-p/576544#M2603</link>
      <description>&lt;P&gt;There can be several issues and URL categories can be tricky to implement with how many different ways traffic can be passed. It is important to remember that URL categories filter based on the FQDN/URL contained within a HTTP/HTTPS (or similar) connection (IP layer 5-7), not based on the DNS name of the destination IP (IP layer 3). From your description I can think of several different possibilities:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) The "Resolve hostname" checkbox in&amp;nbsp; Monitor-&amp;gt;Logs-&amp;gt;Traffic does not show the hostname connected to in the HTTP/HTTPS request. It returns the current reverse-DNS response for the IPs shown in the logs. When the client originally looked up a DNS name it resolved to an IP which is hosting that site, as well as possibly hundreds/thousands of other sites at the same time. The rDNS name may have no relation to the originally called name (i.e. "&lt;A href="http://www.example.com" target="_blank" rel="noopener"&gt;www.example.com&lt;/A&gt;" is hosted on AmazonAWS and resolves to 203.0.113.58, but 203.0.113.58 reverse resolves to "s3-a589.r5-west.srv.amazonaws.com").&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) You can also use URL Categories for filtering just based on the host name (i.e. "example.com/") without SSL/TLS decryption up to TLS1.2, and to a lesser extent TLS1.3 (depending on the PA version and how TLS1.3 connected). This uses hints in the SSL/TLS certificate exchange (SNI - Server Name Indication) before the session is encrypted. However, in order to use URL Categories with a host directory path (i.e "example.com/naughty/files/"), you must be running SSL/TLS decryption as the path name is within the encrypted session (or only looking at non-encrypted HTTP traffic).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3) Under certain circumstances, the client may connect to a host that responds with a SSL certificate that covers multiple hostnames. The client might reuse that existing SSL session to connect to the alternate host name that would otherwise be blocked, but if you are not running SSL/TLS decryption you can't see the target hostname change. (i.e. you block "forum.example.com/" but allow other "*.example.com/" traffic, the client connects with a request for "&lt;A href="http://www.example.com" target="_blank" rel="noopener"&gt;www.example.com&lt;/A&gt;" [which the PA sees and allowed], the server responds with a certificate for "&lt;A href="http://www.example.com" target="_blank" rel="noopener"&gt;www.example.com&lt;/A&gt;" and additional server names "images.example.com" and "forum.example.com" [which is in the encrypted certificate exchange], if the client now reuses the existing SSL session to now request "forum.example.com" files from the same host the PA doesn't know the hostname has changed.)&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 23:59:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/custom-url-category-with-directories/m-p/576544#M2603</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2024-02-07T23:59:10Z</dc:date>
    </item>
  </channel>
</rss>

