<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: &amp;quot;Let's Encrypt&amp;quot; and geoblocking issues in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/quot-let-s-encrypt-quot-and-geoblocking-issues/m-p/592685#M3462</link>
    <description>&lt;P&gt;There is not really a solution until LE decides to publish their validation endpoints, one common solution for this is to open the rule to the world only when a renew is needed and close it inmediatly.&lt;/P&gt;
&lt;P&gt;Some have automated this process via API or simmilar but this depends entirely on your infrastructure.&lt;/P&gt;</description>
    <pubDate>Mon, 22 Jul 2024 22:28:31 GMT</pubDate>
    <dc:creator>jmoscoso1</dc:creator>
    <dc:date>2024-07-22T22:28:31Z</dc:date>
    <item>
      <title>"Let's Encrypt" and geoblocking issues</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/quot-let-s-encrypt-quot-and-geoblocking-issues/m-p/592568#M3455</link>
      <description>&lt;P&gt;Hi, we have a couple 3rd-party applications that use Let's Encrypt for certificate automation. We also use geoblocking rules on our Palo Alto firewall because we are local government, so we block non-US based traffic. I recently learned that Let's Encrypt requires global access due to its nature of validation, because our certificates are failing to renew if I have the US-traffic rule enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone found a way to whitelist Let's Encrypt traffic without opening it up to the entire planet?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 16:37:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/quot-let-s-encrypt-quot-and-geoblocking-issues/m-p/592568#M3455</guid>
      <dc:creator>Maxstr</dc:creator>
      <dc:date>2024-07-19T16:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: "Let's Encrypt" and geoblocking issues</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/quot-let-s-encrypt-quot-and-geoblocking-issues/m-p/592656#M3459</link>
      <description>&lt;P&gt;With the rise of CDNs and anycast, geolocation of a destination servers can be very problematic as a given IP may trace to one location from one source, and a completely different location from a different source. There is no "location" field associated with an IP address registration, so various third parties make a best-guess as to the physical endpoint from their viewpoint and resell that data to others as geolocation... so it will never be perfect to rely on.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are a few ways around the geolocation region coding, depending on what type of traffic you are filtering and how broadly you want to accept:&lt;/P&gt;
&lt;P&gt;1) Custom Region - As many of these destinations are actually CDNs, which may host components of many different major sites, you may want to explore creating a custom region for those associated netblocks. This will override the default PaloAlto geolocation. The advantage of this is that it quickly encompasses a large swath of IPs which are known to be a major commercial hosting point, even those may technically reside in a different country. The disadvantage is that this is non-specific and "bad" sites can use CDNs just like "good" sites. The malware/AV/URL filtering tools should be used for filtering content rather than a geolocation.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Objects-&amp;gt;Regions&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Name=CDN&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;IP=1.1.1.1, 8.8.4.4, 8.8.8.8, 101.53.160.0/18, 118.214.0.0/16, 118.215.0.0/17&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Policies-&amp;gt;Security&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Name=Allow Internet&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;SrcZone=Trust&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;DstZone=Untrust&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;DstAddr=US, CDN&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Action=Allow&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) FQDN List - You can create a custom FQDN address object (or address group of objects) and use that as a destination, in addition to the geolocation. This has the advantage that you are targeting a specific destination address, regardless of the geolocation. The disadvantage is that this must be a specific, resolvable FQDN that you have discovered, wildcards will not work. (Note 1: You can also create an IP address/block list and use it in the same way/different variation of the custom region.)&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Objects-&amp;gt;Addresses&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Name=ExampleSite1&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Type=FQDN&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Address=example.com&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Name=ExampleSite2&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Type=FQDN&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Address=&lt;A href="http://www.example.com" target="_blank" rel="noopener"&gt;www.example.com&lt;/A&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Name=ExampleImageSite&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Type=FQDN&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Address=images.example.com&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Objects-&amp;gt;Address Groups&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Name=ExampleCorp&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Address=ExampleSite1, ExampleSite2, ExampleImageSite&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Policies-&amp;gt;Security&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Name=Allow Internet&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;SrcZone=Trust&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;DstZone=Untrust&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;DstAddr=US, ExampleCorp&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Action=Allow&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3) URL List - You can create a URL list to filter based on the requested content server name instead of the actual IP address. The advantage of this is that you can use wildcards for a range of FQDNs/subdomains. The disadvantage is that this only works for HTTP(S) type applications and the connection must first establish before the requested server name can be determined. (Note1: This is more suited towards allow/deny of specific sites for specific users, in combination with URL filtering, but can also be used for wider allows/denies. Note2: This is best combined with decryption, but will generally work without.)&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Objects-&amp;gt;Custom Objects-&amp;gt;URL Category&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Name=ExampleURL&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;URL List=example.com/, *.example.com/&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Policies-&amp;gt;Security&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Name=Allow Internet&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;SrcZone=Trust&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;DstZone=Untrust&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;DstAddr=US&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Action=Allow&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Name=Allow Internet - specific sites&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;SrcZone=Trust&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;DstZone=Untrust&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Application=web-browsing, SSL&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;URL Category=ExampleURL&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;Action=Allow&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 17:32:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/quot-let-s-encrypt-quot-and-geoblocking-issues/m-p/592656#M3459</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2024-07-22T17:32:14Z</dc:date>
    </item>
    <item>
      <title>Re: "Let's Encrypt" and geoblocking issues</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/quot-let-s-encrypt-quot-and-geoblocking-issues/m-p/592685#M3462</link>
      <description>&lt;P&gt;There is not really a solution until LE decides to publish their validation endpoints, one common solution for this is to open the rule to the world only when a renew is needed and close it inmediatly.&lt;/P&gt;
&lt;P&gt;Some have automated this process via API or simmilar but this depends entirely on your infrastructure.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 22:28:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/quot-let-s-encrypt-quot-and-geoblocking-issues/m-p/592685#M3462</guid>
      <dc:creator>jmoscoso1</dc:creator>
      <dc:date>2024-07-22T22:28:31Z</dc:date>
    </item>
  </channel>
</rss>

