<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic web file blocking in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/web-file-blocking/m-p/1243878#M6519</link>
    <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;We are trying to implement file upload/download blocking for W-Web in our environment using a Palo Alto firewall.&lt;/P&gt;&lt;P&gt;Current setup:&lt;/P&gt;&lt;P&gt;SSL Forward Proxy decryption is enabled.&lt;/P&gt;&lt;P&gt;A decryption certificate has been created on the firewall and installed in the Trusted Root Certification Authorities store on client machines.&lt;/P&gt;&lt;P&gt;Security policy and File Blocking profile are configured to block file transfers for watsapp Web.&lt;/P&gt;&lt;P&gt;Issue observed:&lt;BR /&gt;Even after installing the firewall decryption certificate on the client machines, Wtsup Web continues to present the official Wtsapp certificate chain when verified from the browser. The firewall certificate is not being applied.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Questions:&lt;/P&gt;&lt;P&gt;Does Watsup Web use certificate pinning, which prevents SSL Forward Proxy decryption?&lt;/P&gt;&lt;P&gt;Is SSL Inbound Inspection or any additional SSL/TLS profile required for Wtsup Web file blocking?&lt;/P&gt;&lt;P&gt;Is it possible to block file transfers for Wtsup Web without SSL decryption, using App-ID or Content-ID?&lt;/P&gt;&lt;P&gt;Are there any known Palo Alto limitations or recommended best practices for Wtsup Web file blocking?&lt;/P&gt;&lt;P&gt;Any guidance or real-world experience on this would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thank you in advance for your support.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Dec 2025 06:09:53 GMT</pubDate>
    <dc:creator>Deepa_D</dc:creator>
    <dc:date>2025-12-15T06:09:53Z</dc:date>
    <item>
      <title>web file blocking</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/web-file-blocking/m-p/1243878#M6519</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;We are trying to implement file upload/download blocking for W-Web in our environment using a Palo Alto firewall.&lt;/P&gt;&lt;P&gt;Current setup:&lt;/P&gt;&lt;P&gt;SSL Forward Proxy decryption is enabled.&lt;/P&gt;&lt;P&gt;A decryption certificate has been created on the firewall and installed in the Trusted Root Certification Authorities store on client machines.&lt;/P&gt;&lt;P&gt;Security policy and File Blocking profile are configured to block file transfers for watsapp Web.&lt;/P&gt;&lt;P&gt;Issue observed:&lt;BR /&gt;Even after installing the firewall decryption certificate on the client machines, Wtsup Web continues to present the official Wtsapp certificate chain when verified from the browser. The firewall certificate is not being applied.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Questions:&lt;/P&gt;&lt;P&gt;Does Watsup Web use certificate pinning, which prevents SSL Forward Proxy decryption?&lt;/P&gt;&lt;P&gt;Is SSL Inbound Inspection or any additional SSL/TLS profile required for Wtsup Web file blocking?&lt;/P&gt;&lt;P&gt;Is it possible to block file transfers for Wtsup Web without SSL decryption, using App-ID or Content-ID?&lt;/P&gt;&lt;P&gt;Are there any known Palo Alto limitations or recommended best practices for Wtsup Web file blocking?&lt;/P&gt;&lt;P&gt;Any guidance or real-world experience on this would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thank you in advance for your support.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Dec 2025 06:09:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/web-file-blocking/m-p/1243878#M6519</guid>
      <dc:creator>Deepa_D</dc:creator>
      <dc:date>2025-12-15T06:09:53Z</dc:date>
    </item>
    <item>
      <title>Re: web file blocking</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/web-file-blocking/m-p/1243972#M6523</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;I have not used a decryption profile or anything similar. I just created a policy that allows Wtsapp-base, Wtsapp-chat, and Wtsapp-voice. Initially, I can see that Wtsapp upload and download are blocked, but if I click ‘try again’, I can upload the file. At first it is denied, but if I try again, the file transfer succeeds. Could&amp;nbsp;someone please provide a solution if you are using this in your organization or have tried it in your lab and succeeded?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2025 08:13:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/web-file-blocking/m-p/1243972#M6523</guid>
      <dc:creator>Deepa_D</dc:creator>
      <dc:date>2025-12-16T08:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: web file blocking</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/web-file-blocking/m-p/1244067#M6529</link>
      <description>&lt;P&gt;Applications that use proprietary encryption or certificate pinning cannot be decrypted.&lt;/P&gt;
&lt;P&gt;One example is WhatsApp.&lt;/P&gt;
&lt;P&gt;You either permit it through or block it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another example is Dropbox.&lt;/P&gt;
&lt;P&gt;You can decrypt if Dropbox is being used through web browser but not application as it has pinned certificate.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Dec 2025 14:01:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/web-file-blocking/m-p/1244067#M6529</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-12-17T14:01:23Z</dc:date>
    </item>
  </channel>
</rss>

