<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPP Block IP and URL Filtering in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318010#M768</link>
    <description>&lt;P&gt;I have two questions, one of vulnerability protection and the other on URL Filtering&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For Vulnerability Protection Profiles, is there any downside, such as performance when using the action "Block IP" ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For URL Filtering, when you're allowing inbound traffic into the firewall from the internet, does it make sense/recommended to add a URL Filtering profile to those security rules? I would think no, but asking anyway.&lt;/P&gt;</description>
    <pubDate>Mon, 23 Mar 2020 17:11:10 GMT</pubDate>
    <dc:creator>ce1028</dc:creator>
    <dc:date>2020-03-23T17:11:10Z</dc:date>
    <item>
      <title>VPP Block IP and URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318010#M768</link>
      <description>&lt;P&gt;I have two questions, one of vulnerability protection and the other on URL Filtering&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For Vulnerability Protection Profiles, is there any downside, such as performance when using the action "Block IP" ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For URL Filtering, when you're allowing inbound traffic into the firewall from the internet, does it make sense/recommended to add a URL Filtering profile to those security rules? I would think no, but asking anyway.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 17:11:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318010#M768</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2020-03-23T17:11:10Z</dc:date>
    </item>
    <item>
      <title>Re: VPP Block IP and URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318016#M769</link>
      <description>&lt;P&gt;There shouldn't be a downside to using block IP&lt;/P&gt;&lt;P&gt;Only case I think would cause issues is if&amp;nbsp; you hit on some signature that thousands of hosts are using, causing all of them to get added. It could cause your block IP memory to run out of space to write entries, but that's just theoretical&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For URL filtering you could create a custom category with all your internal fqdns and block everything else. Any additional layer is a good layer &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 17:28:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318016#M769</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-03-23T17:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPP Block IP and URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318019#M770</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;thanks for reply.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If that theoretical scenario happened, what action would the firewall take?&amp;nbsp; Would it still block the threat, even if it had no memory to block the IP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The custom URL list is a very good idea, I was thinking of a scenario where you have a web server and Palo url database changes and your site get's categorized as malware or unknown or another category you typically block, you would essentially block your customers from accessing the site&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 17:56:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318019#M770</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2020-03-23T17:56:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPP Block IP and URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318021#M771</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71649"&gt;@ce1028&lt;/a&gt;&amp;nbsp; yes, first action is to mitigate the threat, so drop packet at least&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A custom category has priority over the URL filtering database so you won't block yourself while preventing all other requests from coming in&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 17:59:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318021#M771</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-03-23T17:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: VPP Block IP and URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318023#M772</link>
      <description>&lt;P&gt;thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;, good to know.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, definitely about url filtering. I was referring to using a url profile without the custom allows&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 18:10:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318023#M772</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2020-03-23T18:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPP Block IP and URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318025#M773</link>
      <description>&lt;P&gt;Without the custom category I wouldn't use URL filtering as it could cause issues if your site gets recategorized&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 18:12:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318025#M773</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-03-23T18:12:48Z</dc:date>
    </item>
    <item>
      <title>Re: VPP Block IP and URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318028#M774</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;thanks much.&amp;nbsp; One more question, when you're using the action Block IP (or even Deny or one of the reset options), is setting packet capture to single or extended useless? Documentation says it won't capture unless action is alert or allow, yet it suggests setting extended for critical, high medium?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 18:44:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318028#M774</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2020-03-23T18:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: VPP Block IP and URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318054#M775</link>
      <description>&lt;P&gt;Single packet.will capture the (1) offending packet, while extended will capture more packets if possible (packets leading up to the hit and any resends afterward)&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 19:21:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318054#M775</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-03-23T19:21:06Z</dc:date>
    </item>
    <item>
      <title>Re: VPP Block IP and URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318064#M776</link>
      <description>&lt;P&gt;Yes, I am aware of that much, but if the action is drop/block etc, will it be able to capture any packets?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 20:14:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318064#M776</guid>
      <dc:creator>ce1028</dc:creator>
      <dc:date>2020-03-23T20:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: VPP Block IP and URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318065#M777</link>
      <description>&lt;P&gt;Yes it will&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 20:16:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vpp-block-ip-and-url-filtering/m-p/318065#M777</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-03-23T20:16:31Z</dc:date>
    </item>
  </channel>
</rss>

