<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL filtering issue in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-issue/m-p/515177#M393</link>
    <description>&lt;P&gt;Thanks for the information you provided...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My requirement is to allow specific website only (google.com) and only on secure port, want to use custom url category in the security policy. how the policy look like then ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 17 Sep 2022 07:13:37 GMT</pubDate>
    <dc:creator>hemant16031981</dc:creator>
    <dc:date>2022-09-17T07:13:37Z</dc:date>
    <item>
      <title>URL filtering issue</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-issue/m-p/515132#M391</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a policy on palo as below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source : A --&amp;gt; going to internet --&lt;/P&gt;
&lt;P&gt;destination address --&amp;gt; any&lt;/P&gt;
&lt;P&gt;Application --&amp;gt; ssl&lt;/P&gt;
&lt;P&gt;service --&amp;gt; aplication default&lt;/P&gt;
&lt;P&gt;custome URL category -- &amp;gt; allowed google.com&lt;/P&gt;
&lt;P&gt;what would be allowed as per this policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2nd scenario&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source : A --&amp;gt; going to internet --&lt;/P&gt;
&lt;P&gt;destination address --&amp;gt; any&lt;/P&gt;
&lt;P&gt;Application --&amp;gt; google-base&lt;/P&gt;
&lt;P&gt;service --&amp;gt; aplication default&lt;/P&gt;
&lt;P&gt;custome URL category -- &amp;gt; allowed google.com&lt;/P&gt;
&lt;P&gt;what would be allowed as per this policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your help!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 17:31:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-issue/m-p/515132#M391</guid>
      <dc:creator>hemant16031981</dc:creator>
      <dc:date>2022-09-16T17:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering issue</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-issue/m-p/515174#M392</link>
      <description>&lt;P&gt;The first scenario would allow connections containing SSL traffic (not just HTTPS, but any data stream wrapped in SSL) to a URL allowed in the custom URL category. Note: Using SSL can get you in trouble when thinking this is HTTPS data. You might put in an inbound allow "SSL" to your DMZ'd web server assuming that this will just allow HTTPS, when in fact it will allow SMTPS, IMAPS, FTPS, etc. to your DMZ server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The second scenario would allow connections identified as google-base (Google app login, basic account services, etc.) to URLs in the custom URL category. Per the application description:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;FONT face="batang,apple gothic" size="3"&gt;&lt;SPAN&gt;This App-ID covers common service and infrastructure traffic generated by all Google services and applications. To safely enable Google's services and applications, this App-ID is required to be permitted by policy.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Both scenarios may suffer from problems in that traffic will not initially be detected as ssl or google-base and allowed as it takes several packets to identify an application and the detection may change as more packets traverse the firewall, so a connection initially identified as SSL to a Google URL may become google-hangouts as more traffic is processed. So you may need some other rule to initially allow traffic thru. Additionally, you may need to have decryption turned on to effectively identify/match your URL categories.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you just want to allow all Google web services (and you want to specifically pass Google traffic thru a specific rule, instead of a general internet access rule), you may do better with a security policy like:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Source : A --&amp;gt; going to internet --&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;destination address --&amp;gt; any&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Application --&amp;gt; web-browsing, ssl&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;service --&amp;gt; application default&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;custom URL category -- &amp;gt; allowed google.com&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;action --&amp;gt; allow&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you intention is to allow Google traffic, but you want to deny Google file storage, then a general access rule plus:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Source : A --&amp;gt; going to internet --&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;destination address --&amp;gt; any&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Application --&amp;gt; google-cloud-storage, google-docs, google-drive-web&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;service --&amp;gt; application default&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;action --&amp;gt; deny&lt;/P&gt;</description>
      <pubDate>Sat, 17 Sep 2022 00:57:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-issue/m-p/515174#M392</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-09-17T00:57:35Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering issue</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-issue/m-p/515177#M393</link>
      <description>&lt;P&gt;Thanks for the information you provided...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My requirement is to allow specific website only (google.com) and only on secure port, want to use custom url category in the security policy. how the policy look like then ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 17 Sep 2022 07:13:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-issue/m-p/515177#M393</guid>
      <dc:creator>hemant16031981</dc:creator>
      <dc:date>2022-09-17T07:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering issue</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-issue/m-p/515198#M396</link>
      <description>&lt;P&gt;If you just want to allow google.com HTTPS services then a slight variation of the first scenario would be:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Source : A --&amp;gt; going to internet --&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;destination address --&amp;gt; any&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Application --&amp;gt; ssl&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;service --&amp;gt; &lt;STRONG&gt;service-https&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;custom URL category -- &amp;gt; allowed google.com&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;action --&amp;gt; allow&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just be aware that Google may use domains other than google.com for some web calls.&lt;/P&gt;</description>
      <pubDate>Sat, 17 Sep 2022 20:39:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/url-filtering-issue/m-p/515198#M396</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-09-17T20:39:43Z</dc:date>
    </item>
  </channel>
</rss>

