<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security policy matches traffic, but custom URL category doesn't work in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/477651#M103688</link>
    <description>&lt;P&gt;I found what the problem was. It has to do with application IDs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you leave application to "&lt;STRONG&gt;any&lt;/STRONG&gt;" and apply URL filtering profile with URL category, it only matches "&lt;STRONG&gt;web-browsing&lt;/STRONG&gt;" and "&lt;STRONG&gt;ssl&lt;/STRONG&gt;" app-ids for URL list regex. Anything else associated with that URL will be governed by predefined category containing it and get blocked. If you add the rest of app-ids exclusively (necessary for a webpage like wetransfer for example), then it will correctly allow traffic on that rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's why when I was matching with "any" in application field, I could see hits on specific rule but also see blocking from generic rule. web-browsing and ssl were matched in specific rule, wetransfer-base etc., matched further down in generic.&amp;nbsp;Seems like "any" doesn't really mean any in the world of PA...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually if URL requires only web-browsing and ssl app-ids it works even with URL category only, but there is a caveat. Rules with URL category only will ignore any other app-ids (even added exclusively) except web-browsing and ssl. Pretty convoluted I should say.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for helping me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 01 Apr 2022 17:29:58 GMT</pubDate>
    <dc:creator>Flang3r</dc:creator>
    <dc:date>2022-04-01T17:29:58Z</dc:date>
    <item>
      <title>Security policy matches traffic, but custom URL category doesn't work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/476816#M103617</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're running VM appliance with PAN-OS 10.1.4&lt;/P&gt;&lt;P&gt;I've created custom URL category matching several wcard domain names, that we want to whitelist for only some LDAP users and added security policy placing it above internet access policy for all users (where URL filtering profile is applied to block URLs by predefined categories). We're decrypting this traffic as well. Policy looks like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Src zone: Inside facing user networks
Src User: user1/user2/user3 (IP addresses obtained via querying PA user agent running in separate VM)
Dst zone: Outside facing Internet
Service: Any
Application: Any
Profile: None
URL Category: Custom URL category I've created
Action: Allow&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This policy matches traffic generated from user1/2/3, but URLs are still blocked and notification indicates them being blocked by default category. Is there anything I'm missing?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 09:33:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/476816#M103617</guid>
      <dc:creator>Flang3r</dc:creator>
      <dc:date>2022-03-30T09:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: Security policy matches traffic, but custom URL category doesn't work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/476955#M103625</link>
      <description>&lt;P&gt;Are the URLs blocked in the default category, but allowed in the custom category? Something I ran into before is that a URL Filtering Block always takes precedence over Allow, even if the Allow URL is more specific.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 16:01:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/476955#M103625</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-03-30T16:01:51Z</dc:date>
    </item>
    <item>
      <title>Re: Security policy matches traffic, but custom URL category doesn't work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/476971#M103626</link>
      <description>&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;Yes these URLs matched by custom URL category are blocked in default category assigned to URL filtering profile. But security policy rule, that uses this default category filtering profile is below (after) this specific rule. I've even tried making another URL filtering profile where I allowed this custom category, but even then they were blocked. There is no overlap of regex matches in single URL profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If block always takes precedence regardless its security rule position, then I can't understand how to allow portion of webpages to specific users/IPs, while blocking them to others. It's either all allow or all block then...&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 18:13:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/476971#M103626</guid>
      <dc:creator>Flang3r</dc:creator>
      <dc:date>2022-03-30T18:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: Security policy matches traffic, but custom URL category doesn't work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/477158#M103638</link>
      <description>&lt;P&gt;There is an odd thing I've noticed in logs. If this security rule above doesn't have custom URL category attached to it, matched traffic (by source LDAP user) is correctly allowed and forwarded, but once I attach URL category although it matches the URL regex, firewall continues evaluating security rules and finally blocks URL because it's blocked in rule below for all users.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 08:36:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/477158#M103638</guid>
      <dc:creator>Flang3r</dc:creator>
      <dc:date>2022-03-31T08:36:38Z</dc:date>
    </item>
    <item>
      <title>Re: Security policy matches traffic, but custom URL category doesn't work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/477387#M103665</link>
      <description>&lt;P&gt;So when you define a URL Category it can be used in 2 places:&lt;/P&gt;&lt;P&gt;&amp;nbsp;- a Service/URL Category traffic identifier under a Security Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;- in a URL Filtering object as an allow/block category (always appears in all URL Filtering objects defaulted to "none")&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you are using your custom URL Category in your specific allow Security Policy, but under the Actions tab of the policy where you set Allow, do you have a Profile Setting with a URL Filtering profile that is actually blocking the connection? Or perhaps the site is also matches a built in category that is set to block in the URL Filtering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I.e.:&lt;/P&gt;&lt;P&gt;URL Category -&amp;gt; "Example":&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; example.com/&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; *.example.com/&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;URL Filtering -&amp;gt; "filterInternet"&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Example: block/block&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; adult: block/block&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; business: allow/allow&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; government: allow/allow&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; social-media: block/block&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Policy -&amp;gt; Security -&amp;gt; "Allow general internet access"&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; SrcZone = Trust&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; DstZone = Untrust&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Action = Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Profile-URL-Filtering = filterInternet&amp;nbsp; &amp;nbsp;&amp;lt;= general block of example.com by category&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Policy -&amp;gt; Security -&amp;gt; "Allow specific users to example.com"&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; SrcZone = Trust&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; SrcUser = Alice, Bob, Eve&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; DstZone = Untrust&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; URL Category = Example&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Action = Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Profile-URL-Filtering = filterInternet&amp;nbsp; &amp;nbsp;&amp;lt;= still blocking of example.com by category&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, for example, in our environment we block Facebook/Twitter/etc. by default using the build in social-networking category. We then have several custom URL categories where we define some Facebook/etc. domains and a custom URL Filter with those categories set to allow. Then, for a specific set of users we filter traffic in an addition allow rule using the alternate URL Filter. We don't try to identify the target URLs in the Security Policy itself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Policy -&amp;gt; Security -&amp;gt; "Allow general internet access"&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; SrcZone = Trust&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; DstZone = Untrust&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Action = Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Profile-URL-Filtering = filterInternet&amp;nbsp; &amp;nbsp;&amp;lt;= general block of social-networking category&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Policy -&amp;gt; Security -&amp;gt; "Allow specific users to example.com"&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; SrcZone = Trust&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; SrcUser = Alice, Bob, Eve&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; DstZone = Untrust&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Action = Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Profile-URL-Filtering = filterInternet-allowFacebook&amp;nbsp; &amp;nbsp;&amp;lt;= general&amp;nbsp;block of social-networking category with additional custom URL Category "Facebook-URLs" set to allow/allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 23:00:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/477387#M103665</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-03-31T23:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: Security policy matches traffic, but custom URL category doesn't work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/477586#M103684</link>
      <description>&lt;P&gt;Hello, thank you again for your time.&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" color="#666699"&gt;&lt;SPAN&gt;So you are using your custom URL Category in your specific allow Security Policy, but under the Actions tab of the policy where you set Allow, do you have a Profile Setting with a URL Filtering profile that is actually blocking the connection?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;True, I use rule with URL category in specific allow, but no profile is applied in that rule.&amp;nbsp;Let's assume my URL category object name is "&lt;STRONG&gt;CAT1&lt;/STRONG&gt;" and has following regex configured:&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" color="#000080"&gt;*.example.com/*&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" color="#000080"&gt;*.example.com/&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" color="#000080"&gt;.example.com/*&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" color="#000080"&gt;.example.com/&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;And URL filtering profile "&lt;STRONG&gt;PROF1&lt;/STRONG&gt;", that has default categories either allowed or blocked, where "&lt;STRONG&gt;CAT1&lt;/STRONG&gt;" is set to &lt;STRONG&gt;none. "&lt;/STRONG&gt;example.com " is in one of the blocked default categories here.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Then I have two security rules as follows from up-&amp;gt;down&lt;/P&gt;&lt;P&gt;Rule1 that allows several LDAP users to any destinations using any apps and any services, "&lt;STRONG&gt;CAT1&lt;/STRONG&gt;" applied to it and profiles set to none.&lt;/P&gt;&lt;P&gt;Rule2 for "General Internet Access", that has profiles enabled and "&lt;STRONG&gt;PROF1&lt;/STRONG&gt;" applied to it.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;What I think I see in logs is, that&amp;nbsp;&lt;STRONG&gt;CAT1&lt;/STRONG&gt; is matched before &lt;STRONG&gt;PROF1&lt;/STRONG&gt;, but instead of allowing this traffic, firewall continues evaluating security policies down the line and finally blocks URL via &lt;STRONG&gt;PROF1&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've also tried the scenario described by you using two separate URL filtering profiles, where in &lt;STRONG&gt;PROF1 CAT1&lt;/STRONG&gt; is set to "none/none" and in &lt;STRONG&gt;PROF2 &lt;/STRONG&gt;(clone of &lt;STRONG&gt;PROF1&lt;/STRONG&gt;) &lt;STRONG&gt;CAT1&lt;/STRONG&gt; is set to "allow/allow". Even then, firewall still blocks access from Rule2 via &lt;STRONG&gt;PROF1&lt;/STRONG&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 14:24:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/477586#M103684</guid>
      <dc:creator>Flang3r</dc:creator>
      <dc:date>2022-04-01T14:24:35Z</dc:date>
    </item>
    <item>
      <title>Re: Security policy matches traffic, but custom URL category doesn't work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/477609#M103686</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;P&gt;What I think I see in logs is, that&amp;nbsp;&lt;STRONG&gt;CAT1&lt;/STRONG&gt; is matched before &lt;STRONG&gt;PROF1&lt;/STRONG&gt;, but instead of allowing this traffic, firewall continues evaluating security policies down the line and finally blocks URL via &lt;STRONG&gt;PROF1&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've also tried the scenario described by you using two separate URL filtering profiles, where in &lt;STRONG&gt;PROF1 CAT1&lt;/STRONG&gt; is set to "none/none" and in &lt;STRONG&gt;PROF2 &lt;/STRONG&gt;(clone of &lt;STRONG&gt;PROF1&lt;/STRONG&gt;) &lt;STRONG&gt;CAT1&lt;/STRONG&gt; is set to "allow/allow". Even then, firewall still blocks access from Rule2 via &lt;STRONG&gt;PROF1&lt;/STRONG&gt;.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;Hmmm, yeah it sounds like you are on the right track, but the PA is taking the General Internet Access rule as a more specific match. Other than that you do not need both *.example.com/ and *.example.com/* in the category (doesn't cause a problem, just a duplicate), I don't see a problem and am a bit stumped.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 15:52:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/477609#M103686</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-04-01T15:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: Security policy matches traffic, but custom URL category doesn't work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/477651#M103688</link>
      <description>&lt;P&gt;I found what the problem was. It has to do with application IDs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you leave application to "&lt;STRONG&gt;any&lt;/STRONG&gt;" and apply URL filtering profile with URL category, it only matches "&lt;STRONG&gt;web-browsing&lt;/STRONG&gt;" and "&lt;STRONG&gt;ssl&lt;/STRONG&gt;" app-ids for URL list regex. Anything else associated with that URL will be governed by predefined category containing it and get blocked. If you add the rest of app-ids exclusively (necessary for a webpage like wetransfer for example), then it will correctly allow traffic on that rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's why when I was matching with "any" in application field, I could see hits on specific rule but also see blocking from generic rule. web-browsing and ssl were matched in specific rule, wetransfer-base etc., matched further down in generic.&amp;nbsp;Seems like "any" doesn't really mean any in the world of PA...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually if URL requires only web-browsing and ssl app-ids it works even with URL category only, but there is a caveat. Rules with URL category only will ignore any other app-ids (even added exclusively) except web-browsing and ssl. Pretty convoluted I should say.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for helping me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 17:29:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/477651#M103688</guid>
      <dc:creator>Flang3r</dc:creator>
      <dc:date>2022-04-01T17:29:58Z</dc:date>
    </item>
    <item>
      <title>Re: Security policy matches traffic, but custom URL category doesn't work</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/581992#M116435</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/214381"&gt;@Flang3r&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;I found what the problem was. It has to do with application IDs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you leave application to "&lt;STRONG&gt;any&lt;/STRONG&gt;" and apply URL filtering profile with URL category... &lt;SPAN&gt;If you add the rest of app-ids exclusively (necessary for a webpage like wetransfer for example), then it will correctly allow traffic on that rule.&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[...]&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Actually if URL requires only web-browsing and ssl app-ids it works even with URL category only, but there is a caveat. Rules with URL category only will ignore any other app-ids (even added exclusively) except web-browsing and ssl. Pretty convoluted I should say.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I know that it's been a year and more since this was written, but I find those two statements to be a contradiction to each other - If I understand this correctly, in the first one, you state that if "add the rest of the app-ids exclusively, then it will correctly allow traffic on that rule", but then in the second paragraph you state that "rules with URL category only will ignore any other app-ids&amp;nbsp;&lt;STRONG&gt;(even added exclusively)&lt;/STRONG&gt; " - so which is it and how can those two both be true ? what am I missing here ?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 06:45:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-matches-traffic-but-custom-url-category-doesn-t/m-p/581992#M116435</guid>
      <dc:creator>Kobiher</dc:creator>
      <dc:date>2024-03-28T06:45:12Z</dc:date>
    </item>
  </channel>
</rss>

