<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cascading URL Filters? in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cascading-url-filters/m-p/174584#M62</link>
    <description>&lt;P&gt;I'm not sure what you mean by cascade. &amp;nbsp;But the PA rule base is such that if you match the conditions in that rule it applies and the rule is operative and further processing stops. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you don't match the conditions the next rule is check and so on down the rule base until a match is found or there are no more rules and the default action occurs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So as soon as you match the web filtering rule and evaluate it further processing stops.&lt;/P&gt;</description>
    <pubDate>Mon, 04 Sep 2017 12:07:00 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2017-09-04T12:07:00Z</dc:date>
    <item>
      <title>Cascading URL Filters?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cascading-url-filters/m-p/174504#M61</link>
      <description>&lt;P&gt;To the world, creating Security rule for a specific user (call it, a rule to permit access dodgy website access), what's involved in "cascading" the rule - so, if there's no matches on that rule, that same user would be challenged against a General Web Access Rule?&amp;nbsp; Is it possible to cascade the rules?&amp;nbsp; Regards, Christopher&lt;/P&gt;</description>
      <pubDate>Sun, 03 Sep 2017 23:15:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cascading-url-filters/m-p/174504#M61</guid>
      <dc:creator>chriss2011</dc:creator>
      <dc:date>2017-09-03T23:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cascading URL Filters?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cascading-url-filters/m-p/174584#M62</link>
      <description>&lt;P&gt;I'm not sure what you mean by cascade. &amp;nbsp;But the PA rule base is such that if you match the conditions in that rule it applies and the rule is operative and further processing stops. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you don't match the conditions the next rule is check and so on down the rule base until a match is found or there are no more rules and the default action occurs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So as soon as you match the web filtering rule and evaluate it further processing stops.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Sep 2017 12:07:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cascading-url-filters/m-p/174584#M62</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-09-04T12:07:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cascading URL Filters?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cascading-url-filters/m-p/174791#M63</link>
      <description>&lt;P&gt;Thanks "&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9524" target="_self"&gt;&lt;FONT color="#333333"&gt;pulukas&lt;/FONT&gt;&lt;/A&gt; " - thinking maybe of another way in answering question, saying ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;* If one Rule has a specific URL-filter applied (and want to apply this to a specific user), how do I configure it to check "just one custom category" then ...&lt;/P&gt;&lt;P&gt;* Fall down to the next rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So just test one (1) custom category?&amp;nbsp; Vs a url filter that tests all categories?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Sep 2017 23:36:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cascading-url-filters/m-p/174791#M63</guid>
      <dc:creator>chriss2011</dc:creator>
      <dc:date>2017-09-04T23:36:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cascading URL Filters?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cascading-url-filters/m-p/174863#M64</link>
      <description>&lt;P&gt;No, this is just not how firewalls in general work. &amp;nbsp;Not just Palo Alto.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They operate on a a match and done basis.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2017 09:35:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cascading-url-filters/m-p/174863#M64</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-09-05T09:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cascading URL Filters?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cascading-url-filters/m-p/175268#M65</link>
      <description>&lt;P&gt;Thanks "pulukas" - something tells me what I'm asking is still not coming across correctly (not around the Access element, but around the "match only 1 URL" filtering), that's ok - I'll do some digging / testing / etc...&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2017 20:44:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cascading-url-filters/m-p/175268#M65</guid>
      <dc:creator>chriss2011</dc:creator>
      <dc:date>2017-09-06T20:44:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cascading URL Filters?</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cascading-url-filters/m-p/175504#M66</link>
      <description>&lt;P&gt;YEA!&amp;nbsp; I found what I was looking for!&amp;nbsp; Had to speak the language of the 'net! (tell it do vs want it do, etc...)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.reddit.com/r/paloaltonetworks/comments/5ul5yx/file_blocking_exception_for_specific_websites/" target="_self"&gt;https://www.reddit.com/r/paloaltonetworks/comments/5ul5yx/file_blocking_exception_for_specific_websites/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure of the compariable article within LIVE?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2017 20:05:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cascading-url-filters/m-p/175504#M66</guid>
      <dc:creator>chriss2011</dc:creator>
      <dc:date>2017-09-07T20:05:56Z</dc:date>
    </item>
  </channel>
</rss>

