<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic URL Filter Security Policy Structure in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/url-filter-security-policy-structure/m-p/459896#M102017</link>
    <description>&lt;P data-unlink="true"&gt;Hello all. New to PAN, and after reviewing the &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/url-filtering/configure-url-filtering" target="_blank" rel="noopener"&gt;documentation&amp;nbsp;&lt;/A&gt;on URL Filtering, I'm confused on the best practice deployment of the policy structure. Here's what I mean:&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;Let's say I want to break out the policies into multiple granular policies for custom exceptions. It would look something like this:&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;1) URL Filter Policy: "Vendor Safelist"&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Custom URL Category "Vendor List": Allow&lt;/LI&gt;&lt;LI&gt;Everything else (pre-defined):???&lt;/LI&gt;&lt;/UL&gt;&lt;P data-unlink="true"&gt;2) URL Filer Policy "MISC Web"&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Pre-Defined categories: Alert some&lt;/LI&gt;&lt;LI&gt;Pre-Defined categories: Block some&lt;/LI&gt;&lt;/UL&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;The way I'm understanding this is that if I access a vendor site, Profile #1 will match and allow it, but I don't want everything else to either block/allow/alert. I want the traffic for non-vendor URLs to progress down to the next policy so it can be processed by #2.&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;The reason for this is to A) have some logical organization of the policies, and B) not have one massive policy to manage everything. What I'm asking today is that it seems like this structure isn't viable, and that only one massive policy can work. Am I missing something?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Jan 2022 18:54:44 GMT</pubDate>
    <dc:creator>Josh_Morris</dc:creator>
    <dc:date>2022-01-20T18:54:44Z</dc:date>
    <item>
      <title>URL Filter Security Policy Structure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filter-security-policy-structure/m-p/459896#M102017</link>
      <description>&lt;P data-unlink="true"&gt;Hello all. New to PAN, and after reviewing the &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/url-filtering/configure-url-filtering" target="_blank" rel="noopener"&gt;documentation&amp;nbsp;&lt;/A&gt;on URL Filtering, I'm confused on the best practice deployment of the policy structure. Here's what I mean:&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;Let's say I want to break out the policies into multiple granular policies for custom exceptions. It would look something like this:&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;1) URL Filter Policy: "Vendor Safelist"&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Custom URL Category "Vendor List": Allow&lt;/LI&gt;&lt;LI&gt;Everything else (pre-defined):???&lt;/LI&gt;&lt;/UL&gt;&lt;P data-unlink="true"&gt;2) URL Filer Policy "MISC Web"&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Pre-Defined categories: Alert some&lt;/LI&gt;&lt;LI&gt;Pre-Defined categories: Block some&lt;/LI&gt;&lt;/UL&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;The way I'm understanding this is that if I access a vendor site, Profile #1 will match and allow it, but I don't want everything else to either block/allow/alert. I want the traffic for non-vendor URLs to progress down to the next policy so it can be processed by #2.&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;The reason for this is to A) have some logical organization of the policies, and B) not have one massive policy to manage everything. What I'm asking today is that it seems like this structure isn't viable, and that only one massive policy can work. Am I missing something?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jan 2022 18:54:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filter-security-policy-structure/m-p/459896#M102017</guid>
      <dc:creator>Josh_Morris</dc:creator>
      <dc:date>2022-01-20T18:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filter Security Policy Structure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filter-security-policy-structure/m-p/460032#M102028</link>
      <description>&lt;P&gt;URL filtering kicks in after traffic has already matched to the security policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could test adding FQDN type address objects for "&lt;SPAN&gt;Vendor List" domains and place those FQDNs into&amp;nbsp;"Vendor Safelist" policy destination address field.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In this case firewall will resolve those addresses to IP and&amp;nbsp;"Vendor Safelist" policy will only match if traffic goes to IPs that host&amp;nbsp;"Vendor List" websites.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 04:21:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filter-security-policy-structure/m-p/460032#M102028</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2022-01-21T04:21:06Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filter Security Policy Structure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filter-security-policy-structure/m-p/460101#M102033</link>
      <description>&lt;P&gt;Hi Josh,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in your security policies you can add the url category as matching criteria under "Service / URL Category"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so you can build 2 security policies&amp;nbsp;&lt;/P&gt;&lt;P&gt;the first with your custom URL&amp;nbsp;&lt;SPAN&gt;"Vendor List"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;and the second one without the URL Category match.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On both you can apply the URL Filtering Profile that is needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Greetings&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 09:32:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filter-security-policy-structure/m-p/460101#M102033</guid>
      <dc:creator>JGriessmeier</dc:creator>
      <dc:date>2022-01-21T09:32:13Z</dc:date>
    </item>
  </channel>
</rss>

