<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic EDL Dynamic Domain list that is allowed in Anti-spyware profile&amp;gt; DNS Polices  is getting sinkholed in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/edl-dynamic-domain-list-that-is-allowed-in-anti-spyware-profile/m-p/573646#M2079</link>
    <description>&lt;P&gt;We have four VM 300 firewalls configured as DNS proxy with DNS Security, where all our users (around 65K) are using them as a DNS resolver. The pano os version we are running is 10.1.11-h4.&lt;/P&gt;
&lt;P&gt;We have configured couple of EDL custom domain list, one to allow domains otherwise blocked by PA's DNS signature and one to block domains that our security finds vulnerable. These EDLs are configured through Anti-spyware profile &amp;gt; DNS Policies &amp;gt; for Allow EDL policy action Alert, and for Block EDL policy action sinkhole.&lt;/P&gt;
&lt;P&gt;Since yesterday, we start seeing that all domains in the Allowed list are getting sinkholed and we see under Monitor &amp;gt; Threats that these domains are blocked by the Blocked EDL.&lt;/P&gt;
&lt;P&gt;We have been working with the TAC since yesterday, and it seems no luck on that.&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 19 Jan 2024 15:17:23 GMT</pubDate>
    <dc:creator>Dereje</dc:creator>
    <dc:date>2024-01-19T15:17:23Z</dc:date>
    <item>
      <title>EDL Dynamic Domain list that is allowed in Anti-spyware profile&gt; DNS Polices  is getting sinkholed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/edl-dynamic-domain-list-that-is-allowed-in-anti-spyware-profile/m-p/573646#M2079</link>
      <description>&lt;P&gt;We have four VM 300 firewalls configured as DNS proxy with DNS Security, where all our users (around 65K) are using them as a DNS resolver. The pano os version we are running is 10.1.11-h4.&lt;/P&gt;
&lt;P&gt;We have configured couple of EDL custom domain list, one to allow domains otherwise blocked by PA's DNS signature and one to block domains that our security finds vulnerable. These EDLs are configured through Anti-spyware profile &amp;gt; DNS Policies &amp;gt; for Allow EDL policy action Alert, and for Block EDL policy action sinkhole.&lt;/P&gt;
&lt;P&gt;Since yesterday, we start seeing that all domains in the Allowed list are getting sinkholed and we see under Monitor &amp;gt; Threats that these domains are blocked by the Blocked EDL.&lt;/P&gt;
&lt;P&gt;We have been working with the TAC since yesterday, and it seems no luck on that.&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 15:17:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/edl-dynamic-domain-list-that-is-allowed-in-anti-spyware-profile/m-p/573646#M2079</guid>
      <dc:creator>Dereje</dc:creator>
      <dc:date>2024-01-19T15:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: EDL Dynamic Domain list that is allowed in Anti-spyware profile&gt; DNS Polices  is getting sinkholed</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/edl-dynamic-domain-list-that-is-allowed-in-anti-spyware-profile/m-p/578138#M2101</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18576"&gt;@Dereje&lt;/a&gt;&lt;A href="https://ballsportsgear.com/" target="_self"&gt;BallSportsGear&lt;/A&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18576"&gt;@Dereje&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;We have four VM 300 firewalls configured as DNS proxy with DNS Security, where all our users (around 65K) are using them as a DNS resolver. The pano os version we are running is 10.1.11-h4.&lt;/P&gt;
&lt;P&gt;We have configured couple of EDL custom domain list, one to allow domains otherwise blocked by PA's DNS signature and one to block domains that our security finds vulnerable. These EDLs are configured through Anti-spyware profile &amp;gt; DNS Policies &amp;gt; for Allow EDL policy action Alert, and for Block EDL policy action sinkhole.&lt;/P&gt;
&lt;P&gt;Since yesterday, we start seeing that all domains in the Allowed list are getting sinkholed and we see under Monitor &amp;gt; Threats that these domains are blocked by the Blocked EDL.&lt;/P&gt;
&lt;P&gt;We have been working with the TAC since yesterday, and it seems no luck on that.&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It seems that you are experiencing a known issue with the DNS Security feature in PAN-OS 10.1.11-h4. According to the Palo Alto Networks Knowledge Base, there is a bug that causes the DNS Security to incorrectly sinkhole domains that are in the allow list of the DNS policy. This bug affects the VM-Series firewalls that are configured as DNS proxies and use external dynamic lists (EDLs) of type domain in the DNS policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The workaround for this issue is downgrade the PAN - OS version 10.1,10 or earlier or to upgrade to&amp;nbsp;10.1.12 or later, which have fixed this bug. Alternatively, you can disable the DNS Security feature on the VM-Series firewalls until you can upgrade or downgrade the PAN-OS version.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this helps to understand and resolve the issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-sheets-root="1" data-sheets-value="{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:&amp;quot;Nicholas185Smith&amp;quot;}" data-sheets-userformat="{&amp;quot;2&amp;quot;:817,&amp;quot;3&amp;quot;:{&amp;quot;1&amp;quot;:0},&amp;quot;7&amp;quot;:{&amp;quot;1&amp;quot;:[{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:0,&amp;quot;5&amp;quot;:{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:0}},{&amp;quot;1&amp;quot;:0,&amp;quot;2&amp;quot;:0,&amp;quot;3&amp;quot;:3},{&amp;quot;1&amp;quot;:1,&amp;quot;2&amp;quot;:0,&amp;quot;4&amp;quot;:2}]},&amp;quot;8&amp;quot;:{&amp;quot;1&amp;quot;:[{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:0,&amp;quot;5&amp;quot;:{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:0}},{&amp;quot;1&amp;quot;:0,&amp;quot;2&amp;quot;:0,&amp;quot;3&amp;quot;:3},{&amp;quot;1&amp;quot;:1,&amp;quot;2&amp;quot;:0,&amp;quot;4&amp;quot;:2}]},&amp;quot;11&amp;quot;:3,&amp;quot;12&amp;quot;:0}"&gt;Nicholas185Smith&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 03:43:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/edl-dynamic-domain-list-that-is-allowed-in-anti-spyware-profile/m-p/578138#M2101</guid>
      <dc:creator>Nicholas185Smith</dc:creator>
      <dc:date>2024-02-28T03:43:32Z</dc:date>
    </item>
  </channel>
</rss>

