<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Bottom most Explicit deny all policy not capturing URLs for Url filtering logs. in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/bottom-most-explicit-deny-all-policy-not-capturing-urls-for-url/m-p/1229624#M5918</link>
    <description>&lt;P&gt;Just apply URL filtering profile to your outgoing rule where categories you want to permit are set to "alert" and those you don't want to permit are set to "block".&lt;/P&gt;
&lt;P&gt;Then you see blocked URL categories matching your general outgoing rule.&lt;/P&gt;</description>
    <pubDate>Wed, 21 May 2025 13:09:26 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2025-05-21T13:09:26Z</dc:date>
    <item>
      <title>Bottom most Explicit deny all policy not capturing URLs for Url filtering logs.</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/bottom-most-explicit-deny-all-policy-not-capturing-urls-for-url/m-p/1229613#M5915</link>
      <description>&lt;P&gt;So we have a URL filtering profile, which when enabled i can see URL filtering logs for a any any test policy, however there is a Deny All policy we created at the bottom most in policy, I have enabled URL filtering profile for that rule. I am seeing normal network traffic but not any log under Monitor &amp;gt; URL filtering. &lt;BR /&gt;&lt;BR /&gt;Yes we do have URL filtering license, just so you now its working for a test rule where its allowed for any to any and we applied url filtering profile.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JubairJunaid_1-1747822277018.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67698i3A47222B70BDCDD6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JubairJunaid_1-1747822277018.png" alt="JubairJunaid_1-1747822277018.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JubairJunaid_0-1747822063272.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67696iA2947E6665C66BD7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JubairJunaid_0-1747822063272.png" alt="JubairJunaid_0-1747822063272.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please advice how i can see the denied URL logs. Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 10:13:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/bottom-most-explicit-deny-all-policy-not-capturing-urls-for-url/m-p/1229613#M5915</guid>
      <dc:creator>JubairJunaid</dc:creator>
      <dc:date>2025-05-21T10:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: Bottom most Explicit deny all policy not capturing URLs for Url filtering logs.</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/bottom-most-explicit-deny-all-policy-not-capturing-urls-for-url/m-p/1229623#M5917</link>
      <description>&lt;P&gt;As Palo is dropping packets matching drop/deny rule it can't perform deep packet inspection for this traffic so you can as well not apply security profiles to this policy - they won't be used anyway.&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 13:05:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/bottom-most-explicit-deny-all-policy-not-capturing-urls-for-url/m-p/1229623#M5917</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-05-21T13:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Bottom most Explicit deny all policy not capturing URLs for Url filtering logs.</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/bottom-most-explicit-deny-all-policy-not-capturing-urls-for-url/m-p/1229624#M5918</link>
      <description>&lt;P&gt;Just apply URL filtering profile to your outgoing rule where categories you want to permit are set to "alert" and those you don't want to permit are set to "block".&lt;/P&gt;
&lt;P&gt;Then you see blocked URL categories matching your general outgoing rule.&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 13:09:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/bottom-most-explicit-deny-all-policy-not-capturing-urls-for-url/m-p/1229624#M5918</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-05-21T13:09:26Z</dc:date>
    </item>
    <item>
      <title>Re: Bottom most Explicit deny all policy not capturing URLs for Url filtering logs.</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/bottom-most-explicit-deny-all-policy-not-capturing-urls-for-url/m-p/1229752#M5922</link>
      <description>&lt;P&gt;It's important to consider a web browsing session is handled by 2 different 'layers' in the palo alto firewall&lt;/P&gt;
&lt;P&gt;first, your security rule will allow or deny a session to flow based on the 6-tuple (source/destination zone, IP, port, protocol). The security rule only looks at basic IP information&lt;/P&gt;
&lt;P&gt;Then, a rule can be instructed to also perform layer7 (deep packet) inspection. This causes the firewall to inspect the traffic at a different level and look at, for example, which URL is being requested inside the flow&lt;/P&gt;
&lt;P&gt;The URL filtering profile will then determine if a connection is allowed (allow or alert action) or denied (block action) for that specific URL&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this results in any web browsing session to have 2 verdicts: allow for the 'traffic' (layer3/4) and alert/block for the content (layer7)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To build a good web browsing policy, you should make a rule that allows traffic from trust to untrust, and has a url filtering profile that is configured to allow and block certain URL categories&lt;/P&gt;
&lt;P&gt;In your traffic log this rule will always be 'allow', in your url filtering log this rule will sometimes be 'alert' and sometimes 'block'&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;by default any security rule that is set to deny or drop, will discard a session at a very early stage (oftentimes already discarding the SYN packet) so there is no layer7 inspection performed on these sessions&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2025 07:57:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/bottom-most-explicit-deny-all-policy-not-capturing-urls-for-url/m-p/1229752#M5922</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2025-05-22T07:57:50Z</dc:date>
    </item>
  </channel>
</rss>

