<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Policy destination field when using URL filtering in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/policy-destination-field-when-using-url-filtering/m-p/1235718#M6183</link>
    <description>&lt;P&gt;I need to write a rule that looks like this&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source zone: Internal&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Destination zone: External&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source address: 10.38.105.201&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Destination address: This is where it is tricky, I need the destination addresses to be *.myqlink.biz *.med.myqlink.net *.internapcdn.net but am aware you cannot use wildcards for FQDN objects, and needs to be done via the custom URL category/URL profile. So would this be “any”?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Application: any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Destination port: tcp-1433&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question to you I guess is as this is an allow rule is it safe to put “any” in the destination address field? Wouldn’t that allow 10.38.105.201 to any destination external? I just want to allow that source to those three wildcards via tcp-1433 and that is it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As well as you create the custom URL category, add those 3 wildcards and maybe a few more for their subdomains, hit ok. Move to URL filtering security profile create one and go to the custom URL category in the security profile and hit alert to have it log to panorama. Then destination “any” in the ACLs destination address field? &amp;lt; of course adding the new URL profile I had just created on the rule? Or is that completely wrong?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just don’t want to allow that 10. IP to anything and everything external, and we just don’t know what the beginning of the domains will be.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are the documents from the vendor, I’ve also uploaded those photos to the discussion&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ports: &lt;A href="https://imgur.com/a/MVH2lG0" target="_blank"&gt;https://imgur.com/a/MVH2lG0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;URLs: &lt;A href="https://imgur.com/a/rxnow-cabinet-requirements-tHx2lua" target="_blank"&gt;https://imgur.com/a/rxnow-cabinet-requirements-tHx2lua&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Aug 2025 13:10:57 GMT</pubDate>
    <dc:creator>Kc_Dodds</dc:creator>
    <dc:date>2025-08-08T13:10:57Z</dc:date>
    <item>
      <title>Policy destination field when using URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/policy-destination-field-when-using-url-filtering/m-p/1235718#M6183</link>
      <description>&lt;P&gt;I need to write a rule that looks like this&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source zone: Internal&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Destination zone: External&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source address: 10.38.105.201&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Destination address: This is where it is tricky, I need the destination addresses to be *.myqlink.biz *.med.myqlink.net *.internapcdn.net but am aware you cannot use wildcards for FQDN objects, and needs to be done via the custom URL category/URL profile. So would this be “any”?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Application: any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Destination port: tcp-1433&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question to you I guess is as this is an allow rule is it safe to put “any” in the destination address field? Wouldn’t that allow 10.38.105.201 to any destination external? I just want to allow that source to those three wildcards via tcp-1433 and that is it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As well as you create the custom URL category, add those 3 wildcards and maybe a few more for their subdomains, hit ok. Move to URL filtering security profile create one and go to the custom URL category in the security profile and hit alert to have it log to panorama. Then destination “any” in the ACLs destination address field? &amp;lt; of course adding the new URL profile I had just created on the rule? Or is that completely wrong?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just don’t want to allow that 10. IP to anything and everything external, and we just don’t know what the beginning of the domains will be.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are the documents from the vendor, I’ve also uploaded those photos to the discussion&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ports: &lt;A href="https://imgur.com/a/MVH2lG0" target="_blank"&gt;https://imgur.com/a/MVH2lG0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;URLs: &lt;A href="https://imgur.com/a/rxnow-cabinet-requirements-tHx2lua" target="_blank"&gt;https://imgur.com/a/rxnow-cabinet-requirements-tHx2lua&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Aug 2025 13:10:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/policy-destination-field-when-using-url-filtering/m-p/1235718#M6183</guid>
      <dc:creator>Kc_Dodds</dc:creator>
      <dc:date>2025-08-08T13:10:57Z</dc:date>
    </item>
    <item>
      <title>Re: Policy destination field when using URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/policy-destination-field-when-using-url-filtering/m-p/1236156#M6214</link>
      <description>&lt;P&gt;this will allow the client to set up 'initial' sessions towards basically anywhere as long as it's using port 1433, but the category lookup mechanism will determine pretty quickly if this session matched the right category or not&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if it doesn,t, the rule will release the session and a new security rule lookup will happen. if the session no longer matches any rules that allow it, it will be dropped&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so while yes, you'll allow tcp handshakes to basically the entire internet, url category lookup should catch up quick before any 'rogue' applications can connect&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 09:47:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/policy-destination-field-when-using-url-filtering/m-p/1236156#M6214</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2025-08-18T09:47:18Z</dc:date>
    </item>
  </channel>
</rss>

