<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic hits policy with URL Category even though the traffic is not for that URL in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/traffic-hits-policy-with-url-category-even-though-the-traffic-is/m-p/1236153#M6212</link>
    <description>&lt;P&gt;are the log entires you are seeing actual proper traffic (ssl/web-browsing,.. app-id, normal session end etc) or are these incomplete app-id sessions?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;these types of rules need to accept all web traffic in order for the firewall to be able to determine the url category (seen in the SNI of http GET typically) which means that at least 4 to 5 packets need to flow through that rule before it is able to determine if it should keep this session (category match) or release this session (no category match, security rule lookup for better match)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what happens if this is a 'rogue' session that is either broken (e.g. server stops responding) or 'abnormal' (url category not found before session already ended by server/client, early RST,.....) that the session dies before it can match a different more accurate rule so the log entry is written with the last rule that session hit before ending&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;rules with only URL category have a high catch rate for bad or broken sessions so there will be lots of logs that mysteriously seem to hit this rule&lt;/P&gt;</description>
    <pubDate>Mon, 18 Aug 2025 09:26:52 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2025-08-18T09:26:52Z</dc:date>
    <item>
      <title>Traffic hits policy with URL Category even though the traffic is not for that URL</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/traffic-hits-policy-with-url-category-even-though-the-traffic-is/m-p/1235959#M6194</link>
      <description>&lt;P&gt;We have several policies that permit traffic to 80/443 with no specific destination address, but with a URL category set for a specific URL.&amp;nbsp; For example, we have a post-rule for VPN users to access our internal Splunk server via the URL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The issue I'm seeing is that I am trying to connect to another device using &lt;A href="https://ipaddress" target="_blank"&gt;https://ipaddress &lt;/A&gt;and the traffic is hitting our Splunk URL rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is not the only URL Category rule we have.&amp;nbsp; I've also seen traffic hit a pre-rule we have using a URL Category.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone experienced this?&amp;nbsp; Is there a good solution?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 17:34:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/traffic-hits-policy-with-url-category-even-though-the-traffic-is/m-p/1235959#M6194</guid>
      <dc:creator>jwill2</dc:creator>
      <dc:date>2025-08-13T17:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic hits policy with URL Category even though the traffic is not for that URL</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/traffic-hits-policy-with-url-category-even-though-the-traffic-is/m-p/1236153#M6212</link>
      <description>&lt;P&gt;are the log entires you are seeing actual proper traffic (ssl/web-browsing,.. app-id, normal session end etc) or are these incomplete app-id sessions?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;these types of rules need to accept all web traffic in order for the firewall to be able to determine the url category (seen in the SNI of http GET typically) which means that at least 4 to 5 packets need to flow through that rule before it is able to determine if it should keep this session (category match) or release this session (no category match, security rule lookup for better match)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what happens if this is a 'rogue' session that is either broken (e.g. server stops responding) or 'abnormal' (url category not found before session already ended by server/client, early RST,.....) that the session dies before it can match a different more accurate rule so the log entry is written with the last rule that session hit before ending&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;rules with only URL category have a high catch rate for bad or broken sessions so there will be lots of logs that mysteriously seem to hit this rule&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 09:26:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/traffic-hits-policy-with-url-category-even-though-the-traffic-is/m-p/1236153#M6212</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2025-08-18T09:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic hits policy with URL Category even though the traffic is not for that URL</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/traffic-hits-policy-with-url-category-even-though-the-traffic-is/m-p/1236172#M6215</link>
      <description>&lt;P&gt;Looking at the traffic log, the traffic is showing as incomplete and aged out.&amp;nbsp; I will have to try to replicate it and pull a packet capture to get more information&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 14:23:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/traffic-hits-policy-with-url-category-even-though-the-traffic-is/m-p/1236172#M6215</guid>
      <dc:creator>jwill2</dc:creator>
      <dc:date>2025-08-18T14:23:06Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic hits policy with URL Category even though the traffic is not for that URL</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/traffic-hits-policy-with-url-category-even-though-the-traffic-is/m-p/1236504#M6235</link>
      <description>&lt;P&gt;sounds like what i described, and expected behavior&lt;/P&gt;</description>
      <pubDate>Fri, 22 Aug 2025 08:54:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/traffic-hits-policy-with-url-category-even-though-the-traffic-is/m-p/1236504#M6235</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2025-08-22T08:54:59Z</dc:date>
    </item>
  </channel>
</rss>

