<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Best Practice for URL policy question in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practice-for-url-policy-question/m-p/510610#M256</link>
    <description>&lt;P&gt;So the scenario is we have an app on a server which needs to access several URLs. My colleague setup a custom URL Category and applied it to the policy, but the problem is this isn't working. From my reading on URL Categories, this applies to web-browsing traffic, not URLs themselves as destinations. Meaning if traffic is deemed to be something else other than web-browsing, but still reaches the same URL on port 443, it won't apply the URL category.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So user &amp;gt; web browser &amp;gt; URL would trigger this.&lt;/P&gt;
&lt;P&gt;But service &amp;gt; application &amp;gt; URL would not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only other way I know how to allow this is by creating a FQDN object for the domain of the resource and allowing that in a policy for the destination, but that opens up way more than the specific resource we want to allow.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the best way to restrict application traffic to a URL if we cannot use URL Categories?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 02 Aug 2022 17:47:56 GMT</pubDate>
    <dc:creator>Josh_Morris</dc:creator>
    <dc:date>2022-08-02T17:47:56Z</dc:date>
    <item>
      <title>Best Practice for URL policy question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practice-for-url-policy-question/m-p/510610#M256</link>
      <description>&lt;P&gt;So the scenario is we have an app on a server which needs to access several URLs. My colleague setup a custom URL Category and applied it to the policy, but the problem is this isn't working. From my reading on URL Categories, this applies to web-browsing traffic, not URLs themselves as destinations. Meaning if traffic is deemed to be something else other than web-browsing, but still reaches the same URL on port 443, it won't apply the URL category.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So user &amp;gt; web browser &amp;gt; URL would trigger this.&lt;/P&gt;
&lt;P&gt;But service &amp;gt; application &amp;gt; URL would not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only other way I know how to allow this is by creating a FQDN object for the domain of the resource and allowing that in a policy for the destination, but that opens up way more than the specific resource we want to allow.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the best way to restrict application traffic to a URL if we cannot use URL Categories?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2022 17:47:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practice-for-url-policy-question/m-p/510610#M256</guid>
      <dc:creator>Josh_Morris</dc:creator>
      <dc:date>2022-08-02T17:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice for URL policy question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practice-for-url-policy-question/m-p/511164#M260</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206916"&gt;@Josh_Morris&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;but still reaches the same URL on port 443, it won't apply the URL category.&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Usually port 443 is used for TLS applications, in which case it should be possible to use with a URL category. We use the SNI in the Client Hello and can also use the certificate CN to determine URL's if the traffic is not decrypted. If the traffic is not decrypted, you can only match custom URL's based on the actual domain and not the full URI path.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If it's completely a non web application, let's say RADIUS for example, then no you can't match with a custom category since it's just IP to IP traffic without a URL. In that case I don't see how an FQDN would allow more access than you want. It will allow access to a specific IP, and you can further lock down the rule through the use of applications and services.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- DM&lt;/P&gt;</description>
      <pubDate>Sat, 06 Aug 2022 19:04:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/best-practice-for-url-policy-question/m-p/511164#M260</guid>
      <dc:creator>dmifsud</dc:creator>
      <dc:date>2022-08-06T19:04:35Z</dc:date>
    </item>
  </channel>
</rss>

