<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL filtering not working in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-not-working/m-p/578197#M2691</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/323965"&gt;@iarobertson&lt;/a&gt; thanks. I did open a case last night. We wound up creating a decryption profile, which created other issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Incidentally, they said that the decryption was necessary to read sni values.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question is.... is it necessary to use decryption for URL filtering? ie for correct categorization. I was using the pan test sites to verify url filtering. But, I wonder if that presented the problem a problem that isn't necessarily a problem with the actual sites to be blocked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The palo test sites all use the same host portion of the URL, it's just the /test-hacking/ portion that designates the category. But, in order for the firewall to know the difference between the two, it needs to look at the whole path, and maybe it can't do that without actual decryption?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But actual hacking sites that we are actually trying to block would use different hostnames. just like yahoo.com is different than google.com. So maybe the url filtering would work better, without decryption, in real world scenarios?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, I can appreciate that a more comprehensive security posture analyze the whole path. Within this conversation, I am just trying to better understand.&lt;/P&gt;</description>
    <pubDate>Fri, 23 Feb 2024 14:45:57 GMT</pubDate>
    <dc:creator>nwnetadmin</dc:creator>
    <dc:date>2024-02-23T14:45:57Z</dc:date>
    <item>
      <title>URL filtering not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-not-working/m-p/578128#M2688</link>
      <description>&lt;P&gt;M&lt;FONT face="arial,helvetica,sans-serif"&gt;y issue is that the url filtering isn't &lt;/FONT&gt;working. I for example, I can browse to&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;FONT size="4"&gt;urlfiltering.paloaltonetworks.com/test-adult and it isn't blocked.&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;FONT size="4"&gt;This is on a PA-220. It is currently running 10.1.3-h3. Earlier today, I noticed that the URL filtering license was expired, but I just did "retrieve&lt;/FONT&gt;&lt;FONT size="4"&gt; lice&lt;/FONT&gt;&lt;FONT size="4"&gt;nse&lt;/FONT&gt;&lt;FONT size="4"&gt; keys from license server" and now it shows that it si good. Both the "PAN-DB URL Filtering" and "Advanced URL Filtering" has valid licenses. However, I haven't rebooted since then.&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;FONT size="4"&gt;One thing that I noticed is that, the url filter logs, it shows:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nwnetadmin_0-1708648821131.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57815iBC00F6E232FB0A44/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="nwnetadmin_0-1708648821131.png" alt="nwnetadmin_0-1708648821131.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I tracked the allow-web-browsing rule and that points to the outbound-url security profile which clearly blocks the adult category.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, it is categorizing it wrong. I wonder if that is related to the fact that the URL is only showing the host name portion. Like, it isn't considering the /test-adult/ and that is why it can't put it in the right category? If that is by design, then it was defeat the point of having the test sites.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did the below commands.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;admin@PA-220&amp;gt; show url-cloud status&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;PAN-DB URL Filtering&lt;BR /&gt;License : valid&lt;BR /&gt;Current cloud server : serverlist3.urlcloud.paloaltonetworks.com&lt;BR /&gt;Cloud connection : connected&lt;BR /&gt;Cloud mode : public&lt;BR /&gt;URL database version - device : 20240222.20354&lt;BR /&gt;URL database version - cloud : 20240222.20354 ( last update time 2024/02 15:32:13 )&lt;BR /&gt;URL database status : good&lt;BR /&gt;URL protocol version - device : pan/2.0.0&lt;BR /&gt;URL protocol version - cloud : pan/2.0.0&lt;BR /&gt;Protocol compatibility status : compatible&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;BR /&gt;admin@PA-220&amp;gt; test url &lt;A href="http://urlfiltering.paloaltonetworks.com/test-adult" target="_blank"&gt;http://urlfiltering.paloaltonetworks.com/test-adult&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;urlfiltering.paloaltonetworks.com/test-adult not-resolved (Base db) mlav_flagexpires in 5 seconds&lt;BR /&gt;urlfiltering.paloaltonetworks.com/test-adult adult low-risk (Cloud db)&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it possible that it isn't "digesting" the Cloud db properly and not applying it to the Base db?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am going to update to 10.1.11-h5 tonight. Maybe that will help. Maybe a reboot since the license issue is resolved will help. In the meantime, I thought I'd put it out there and see if anyone else had any better ideas. I might open a case with support.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2024 00:46:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-not-working/m-p/578128#M2688</guid>
      <dc:creator>nwnetadmin</dc:creator>
      <dc:date>2024-02-23T00:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-not-working/m-p/578129#M2689</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/164300"&gt;@nwnetadmin&lt;/a&gt;&amp;nbsp;- I would suggest a TAC case is appropriate here.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2024 00:48:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-not-working/m-p/578129#M2689</guid>
      <dc:creator>iarobertson</dc:creator>
      <dc:date>2024-02-23T00:48:39Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-not-working/m-p/578197#M2691</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/323965"&gt;@iarobertson&lt;/a&gt; thanks. I did open a case last night. We wound up creating a decryption profile, which created other issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Incidentally, they said that the decryption was necessary to read sni values.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question is.... is it necessary to use decryption for URL filtering? ie for correct categorization. I was using the pan test sites to verify url filtering. But, I wonder if that presented the problem a problem that isn't necessarily a problem with the actual sites to be blocked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The palo test sites all use the same host portion of the URL, it's just the /test-hacking/ portion that designates the category. But, in order for the firewall to know the difference between the two, it needs to look at the whole path, and maybe it can't do that without actual decryption?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But actual hacking sites that we are actually trying to block would use different hostnames. just like yahoo.com is different than google.com. So maybe the url filtering would work better, without decryption, in real world scenarios?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, I can appreciate that a more comprehensive security posture analyze the whole path. Within this conversation, I am just trying to better understand.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2024 14:45:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-not-working/m-p/578197#M2691</guid>
      <dc:creator>nwnetadmin</dc:creator>
      <dc:date>2024-02-23T14:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-not-working/m-p/578204#M2692</link>
      <description>&lt;P&gt;&lt;SPAN&gt;"My question is.... is it necessary to use decryption for URL filtering? ie for correct categorization."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For fully correct categorization, yes. Without decryption you'll just see the main domain, i.e. google.com/ vs google.com/something&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Generally ssl decryption for url filtering is not necessarily the biggest deal, except in these test cases. Dont get me wrong, it could be, its just a really small sample. With the example of the palos site, basically everything is going to be&amp;nbsp;computer-and-internet-info with the exception being those test pages&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Having ssl inspection enabled is also Palo Alto best practices due to inspecting traffic, application identifications (and by extenstion more granular controls), and things like full url identification and credential detections.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/advanced-url-filtering/administration/configuring-url-filtering/test-url-filtering-configuration" target="_blank"&gt;Test URL Filtering Configuration (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2024 15:34:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-not-working/m-p/578204#M2692</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-02-23T15:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-not-working/m-p/578322#M2706</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/164300"&gt;@nwnetadmin&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/323965"&gt;@iarobertson&lt;/a&gt; thanks. I did open a case last night. We wound up creating a decryption profile, which created other issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Incidentally, they said that the decryption was necessary to read sni values.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question is.... is it necessary to use decryption for URL filtering? ie for correct categorization. I was using the pan test sites to verify url filtering. But, I wonder if that presented the problem a problem that isn't necessarily a problem with the actual sites to be blocked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The palo test sites all use the same host portion of the URL, it's just the /test-hacking/ portion that designates the category. But, in order for the firewall to know the difference between the two, it needs to look at the whole path, and maybe it can't do that without actual decryption?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But actual hacking sites that we are actually trying to block would use different hostnames. just like yahoo.com is different than google.com. So maybe the url filtering would work better, without decryption, in real world scenarios?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, I can appreciate that a more comprehensive security posture analyze the whole path. Within this conversation, I am just trying to better understand.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/164300"&gt;@nwnetadmin&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;You are right about the host portion of&amp;nbsp;urlfiltering.paloaltonetworks.com/test-adult.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you capture the ssl handshake with wireshark, you will see in the ssl client hello that the SNI is urlfiltering.paloaltonetworks.com.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is the same for the CN in the certificate; the CN is urlfiltering.paloaltonetworks.com.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So there is no way for the URL filtering profile to categorize the URL unless the traffic is decrypted.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the other hand, I tested with another adult site where the SNI clearly indicated adult content, and the URL filter correctly categorized the site as adult, and therefore the access was "block-url".&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--Richard&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 11:05:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-not-working/m-p/578322#M2706</guid>
      <dc:creator>rdumoulin</dc:creator>
      <dc:date>2024-02-26T11:05:21Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-not-working/m-p/578407#M2714</link>
      <description>&lt;P&gt;thanks to both of you.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 00:24:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-not-working/m-p/578407#M2714</guid>
      <dc:creator>nwnetadmin</dc:creator>
      <dc:date>2024-02-27T00:24:14Z</dc:date>
    </item>
  </channel>
</rss>

