<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall is allowing certain packets through different policy in URL based traffic blocking scenario in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/firewall-is-allowing-certain-packets-through-different-policy-in/m-p/450229#M1400</link>
    <description>&lt;P&gt;Thank you for posting question&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/165087"&gt;@tamilvanan&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since your EDL type is URL, I would recommend to check URL logs instead of Traffic logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Coming back to your question, could you please elaborate how you applied EDL? Did you add the block URL EDL directly under: Security Policy Rule &amp;gt; Service/URL Category or did you add under:&amp;nbsp;Security Policy Rule &amp;gt; Profile Setting &amp;gt; URL Filtering / Group Profile?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you applied it directly under&amp;nbsp;Service/URL Category, then match against URL, will be blocked directly under security policy and you should see it in the Traffic log as being blocked. If you see this as allowed in the log, could you check more details under: Detailed Log View?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have applied it under:&amp;nbsp;URL Filtering / Group Profile, then in Traffic log, you should see the result of policy being evaluated against 6 tuple. If the result is allow, then you will see this traffic being allowed in Traffic log, but as a subject of L7 processing under URL filtering in&amp;nbsp;URL Filtering / Group Profile, the result in URL log will be block-url if there is a match.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
    <pubDate>Mon, 29 Nov 2021 23:37:23 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2021-11-29T23:37:23Z</dc:date>
    <item>
      <title>Firewall is allowing certain packets through different policy in URL based traffic blocking scenario</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/firewall-is-allowing-certain-packets-through-different-policy-in/m-p/450089#M1398</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We had configured an EDL today with URL list and created an security policy and applied it for an specific source IP address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We had tried to access an URL in the EDL list and the website is not loading on the PC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When checking the Traffic logs with source and destination IP some traffic is being blocked through desired policy. But some traffic is being allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this an expected behaviour when comes to URL based blocking as the firewall will allow TCP handshake and the initial SSL/TLS handshake&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 17:12:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/firewall-is-allowing-certain-packets-through-different-policy-in/m-p/450089#M1398</guid>
      <dc:creator>tamilvanan</dc:creator>
      <dc:date>2021-11-29T17:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall is allowing certain packets through different policy in URL based traffic blocking scenario</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/firewall-is-allowing-certain-packets-through-different-policy-in/m-p/450229#M1400</link>
      <description>&lt;P&gt;Thank you for posting question&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/165087"&gt;@tamilvanan&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since your EDL type is URL, I would recommend to check URL logs instead of Traffic logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Coming back to your question, could you please elaborate how you applied EDL? Did you add the block URL EDL directly under: Security Policy Rule &amp;gt; Service/URL Category or did you add under:&amp;nbsp;Security Policy Rule &amp;gt; Profile Setting &amp;gt; URL Filtering / Group Profile?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you applied it directly under&amp;nbsp;Service/URL Category, then match against URL, will be blocked directly under security policy and you should see it in the Traffic log as being blocked. If you see this as allowed in the log, could you check more details under: Detailed Log View?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have applied it under:&amp;nbsp;URL Filtering / Group Profile, then in Traffic log, you should see the result of policy being evaluated against 6 tuple. If the result is allow, then you will see this traffic being allowed in Traffic log, but as a subject of L7 processing under URL filtering in&amp;nbsp;URL Filtering / Group Profile, the result in URL log will be block-url if there is a match.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 23:37:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/firewall-is-allowing-certain-packets-through-different-policy-in/m-p/450229#M1400</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2021-11-29T23:37:23Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall is allowing certain packets through different policy in URL based traffic blocking scenario</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/firewall-is-allowing-certain-packets-through-different-policy-in/m-p/452673#M1411</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt;&amp;nbsp;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your inputs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am going through the documentations and my understanding from those documentations is that the firewall handles HTTP and HTTPS traffic differently.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For HTTP traffic the firewall allow till the GET packet to identify the HTTP website the user is trying to access and blocks the HTTP site. So the initial packets will be allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Same for HTTPS site the firewall will allow the traffic of TCP handshake , SSL/TLS handshake and then once the firewall get the Certificate it will look into the CN name of the certificate and will block that session. So we will see few packets going out to the websites when we filter on traffic log using the website IP address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my understanding&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 09:51:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/firewall-is-allowing-certain-packets-through-different-policy-in/m-p/452673#M1411</guid>
      <dc:creator>tamilvanan</dc:creator>
      <dc:date>2021-12-11T09:51:57Z</dc:date>
    </item>
  </channel>
</rss>

