<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to block traffic from a specific ASN using DAG in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-block-traffic-from-a-specific-asn-using-dag/m-p/1233738#M6088</link>
    <description>&lt;P&gt;I could use some assistance since AI sucks and gives you the wrong info.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's what I would like to do, we already geoblock but I need to block malicious traffic (multible IP ranges) that's associated with a specific ASN.&amp;nbsp; I've tried creating a dynamic address group with the following match criteria:&amp;nbsp;&amp;nbsp;'ip.src.asnum AS14956'.&amp;nbsp; I initially tried it without the AS in front of the number, but when I check, there are not IP ranges in the group.&amp;nbsp; When I googled it initially, AI said to use&amp;nbsp;&lt;SPAN&gt;ip.geoip.asnum but when it errored out and I google some more found that it was replaced with ip.src.asnum which is what I'm using as the match criteria.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Since documentation is not very good for what match criteria can be used, can someone please help me with this because I would also like to block all the scans from "shadowservers" and they have a ton of IP's as well.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 10 Jul 2025 15:05:33 GMT</pubDate>
    <dc:creator>Layne-Corbett</dc:creator>
    <dc:date>2025-07-10T15:05:33Z</dc:date>
    <item>
      <title>How to block traffic from a specific ASN using DAG</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-block-traffic-from-a-specific-asn-using-dag/m-p/1233738#M6088</link>
      <description>&lt;P&gt;I could use some assistance since AI sucks and gives you the wrong info.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's what I would like to do, we already geoblock but I need to block malicious traffic (multible IP ranges) that's associated with a specific ASN.&amp;nbsp; I've tried creating a dynamic address group with the following match criteria:&amp;nbsp;&amp;nbsp;'ip.src.asnum AS14956'.&amp;nbsp; I initially tried it without the AS in front of the number, but when I check, there are not IP ranges in the group.&amp;nbsp; When I googled it initially, AI said to use&amp;nbsp;&lt;SPAN&gt;ip.geoip.asnum but when it errored out and I google some more found that it was replaced with ip.src.asnum which is what I'm using as the match criteria.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Since documentation is not very good for what match criteria can be used, can someone please help me with this because I would also like to block all the scans from "shadowservers" and they have a ton of IP's as well.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 15:05:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-block-traffic-from-a-specific-asn-using-dag/m-p/1233738#M6088</guid>
      <dc:creator>Layne-Corbett</dc:creator>
      <dc:date>2025-07-10T15:05:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to block traffic from a specific ASN using DAG</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-block-traffic-from-a-specific-asn-using-dag/m-p/1234163#M6097</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/68439"&gt;@Layne-Corbett&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You could use something like this&amp;nbsp;&lt;A href="https://iserv.nl/files/edl/feed.php" target="_blank"&gt;https://iserv.nl/files/edl/feed.php&lt;/A&gt;&amp;nbsp;if you didn't want to build out my own way of doing this via a script and an EDL that the firewall pulls. Personally, I would highly recommend building it out yourself so that you aren't dependent on some random resource online and you can customize it to your own liking.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could utilize something like&amp;nbsp;&lt;A href="https://api.bgpview.io/asn/14956/prefixes" target="_blank"&gt;https://api.bgpview.io/asn/14956/prefixes&lt;/A&gt;&amp;nbsp;for collecting the addresses and then feed them in as an EDL after (ideally) doing some validation to make sure that you aren't going to break things.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It looks like AI pulled together some dynamic tags that would come into play if you had VM information sources configured and actively monitored. I've never once seen any reference to ip.src.asnum or ip.geoip.asnum in PAN-OS and the only thing I can find is AI generation when looking for them. This appears to be a complete hallucination and it has you going down a very incorrect path.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jul 2025 21:37:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-block-traffic-from-a-specific-asn-using-dag/m-p/1234163#M6097</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-07-16T21:37:43Z</dc:date>
    </item>
  </channel>
</rss>

