<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL decryption policy - strange behaviour in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-policy-strange-behaviour/m-p/480966#M104104</link>
    <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Recently I had a situation where Cisco Webex traffic was decrypted by policy - let's call them "URL_policy"&lt;/P&gt;&lt;P&gt;'URL_policy" was set to decrypt traffic based on the categorization of URL likes: drugs, extremism, gambling, adult, malware, nudity, etc - nothing business-related for sure.&lt;/P&gt;&lt;P&gt;Just after this policy was my "webex_do_not_decrypt" policy, based of destination IP&lt;/P&gt;&lt;P&gt;&lt;A href="https://help.webex.com/en-us/article/WBX264/How-Do-I-Allow-Webex-Meetings-Traffic-on-My-Network?#id_135011" target="_blank" rel="noopener"&gt;https://help.webex.com/en-us/article/WBX264/How-Do-I-Allow-Webex-Meetings-Traffic-on-My-Network?#id_135011&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For an unknown reason, Webex traffic hit the first rule, why?&lt;BR /&gt;Here you have examples of destination IP which belongs for Cisco Webex services:&lt;/P&gt;&lt;P&gt;( addr.dst in 170.72.131.16 )&lt;/P&gt;&lt;P&gt;170.72.0.0/16 170.72.0.1 - 170.72.255.254&lt;/P&gt;&lt;P&gt;( addr.dst in 209.197.208.182 ) and ( addr.dst in 209.197.208.148 )&lt;/P&gt;&lt;P&gt;209.197.192.0/19 209.197.192.1 - 209.197.223.254&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NSLOOKUP shows:&lt;/P&gt;&lt;P&gt;Name: m09txmcs182.webex.com&lt;BR /&gt;Address: 170.72.131.16&lt;/P&gt;&lt;P&gt;while two others don't have DNS records assigned, but belong to Organization: Cisco Webex LLC (WEX)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I asked PA TAC and got the explanation that due to technical limitations on PANOS 9.1 there is no way to check why - really??!?&lt;/P&gt;&lt;P&gt;I know how to check reputation of URL (&lt;A href="https://urlfiltering.paloaltonetworks.com/query/" target="_blank" rel="noopener"&gt;https://urlfiltering.paloaltonetworks.com/query/&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Help me please to understand why the traffic hit first policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;</description>
    <pubDate>Tue, 19 Apr 2022 11:43:19 GMT</pubDate>
    <dc:creator>S_Owoc</dc:creator>
    <dc:date>2022-04-19T11:43:19Z</dc:date>
    <item>
      <title>SSL decryption policy - strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-policy-strange-behaviour/m-p/480966#M104104</link>
      <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Recently I had a situation where Cisco Webex traffic was decrypted by policy - let's call them "URL_policy"&lt;/P&gt;&lt;P&gt;'URL_policy" was set to decrypt traffic based on the categorization of URL likes: drugs, extremism, gambling, adult, malware, nudity, etc - nothing business-related for sure.&lt;/P&gt;&lt;P&gt;Just after this policy was my "webex_do_not_decrypt" policy, based of destination IP&lt;/P&gt;&lt;P&gt;&lt;A href="https://help.webex.com/en-us/article/WBX264/How-Do-I-Allow-Webex-Meetings-Traffic-on-My-Network?#id_135011" target="_blank" rel="noopener"&gt;https://help.webex.com/en-us/article/WBX264/How-Do-I-Allow-Webex-Meetings-Traffic-on-My-Network?#id_135011&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For an unknown reason, Webex traffic hit the first rule, why?&lt;BR /&gt;Here you have examples of destination IP which belongs for Cisco Webex services:&lt;/P&gt;&lt;P&gt;( addr.dst in 170.72.131.16 )&lt;/P&gt;&lt;P&gt;170.72.0.0/16 170.72.0.1 - 170.72.255.254&lt;/P&gt;&lt;P&gt;( addr.dst in 209.197.208.182 ) and ( addr.dst in 209.197.208.148 )&lt;/P&gt;&lt;P&gt;209.197.192.0/19 209.197.192.1 - 209.197.223.254&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NSLOOKUP shows:&lt;/P&gt;&lt;P&gt;Name: m09txmcs182.webex.com&lt;BR /&gt;Address: 170.72.131.16&lt;/P&gt;&lt;P&gt;while two others don't have DNS records assigned, but belong to Organization: Cisco Webex LLC (WEX)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I asked PA TAC and got the explanation that due to technical limitations on PANOS 9.1 there is no way to check why - really??!?&lt;/P&gt;&lt;P&gt;I know how to check reputation of URL (&lt;A href="https://urlfiltering.paloaltonetworks.com/query/" target="_blank" rel="noopener"&gt;https://urlfiltering.paloaltonetworks.com/query/&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Help me please to understand why the traffic hit first policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2022 11:43:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-policy-strange-behaviour/m-p/480966#M104104</guid>
      <dc:creator>S_Owoc</dc:creator>
      <dc:date>2022-04-19T11:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption policy - strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-policy-strange-behaviour/m-p/481059#M104107</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/138089"&gt;@S_Owoc&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you share some screenshots or config snippets of the rules and also screenshots from the URL and/or Traffic Log of that connection? Actually I do not really agree with TAC - maybe there was a misunderstanding - but there definately is a way to check why it hit rule 1.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2022 16:31:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-policy-strange-behaviour/m-p/481059#M104107</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2022-04-19T16:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption policy - strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-policy-strange-behaviour/m-p/481225#M104142</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, I can't share screenshots here, those policies are very basic (from inside to outside any any - and the only thing is that 'URL_policy" has some URL category assigned to it - nothing else.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I can share is:&lt;/P&gt;&lt;P&gt;sowoc@FW01(active)&amp;gt; test decryption-policy-match from Inside source X.X.X.X destination 23.89.0.11&lt;BR /&gt;Matched rule: 'URL_policy' action: decrypt&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;and show session:&lt;/P&gt;&lt;P&gt;c2s flow:&lt;BR /&gt;source: X.X.X.X [Inside]&lt;BR /&gt;dst: 23.89.0.11&lt;BR /&gt;proto: 6&lt;BR /&gt;sport: 49496 dport: 443&lt;BR /&gt;state: DISCARD type: FLOW&lt;BR /&gt;src user: unknown&lt;BR /&gt;dst user: unknown&lt;BR /&gt;offload: Yes&lt;/P&gt;&lt;P&gt;s2c flow:&lt;BR /&gt;source: 23.89.0.11 [Outside]&lt;BR /&gt;dst: X.X.X.X&lt;BR /&gt;proto: 6&lt;BR /&gt;sport: 443 dport: 49496&lt;BR /&gt;state: DISCARD type: FLOW&lt;BR /&gt;src user: unknown&lt;BR /&gt;dst user: unknown&lt;BR /&gt;offload: Yes&lt;/P&gt;&lt;P&gt;Slot : 1&lt;BR /&gt;DP : 0&lt;BR /&gt;index(local): : 8206204&lt;BR /&gt;start time : Mon Apr 4 13:18:59 2022&lt;BR /&gt;timeout : 90 sec&lt;BR /&gt;time to live : 7 sec&lt;BR /&gt;total byte count(c2s) : 759&lt;BR /&gt;total byte count(s2c) : 6528&lt;BR /&gt;layer7 packet count(c2s) : 7&lt;BR /&gt;layer7 packet count(s2c) : 12&lt;BR /&gt;vsys : vsys1&lt;BR /&gt;application : ssl&lt;BR /&gt;rule : SEC-RULE&lt;BR /&gt;service timeout override(index) : False&lt;BR /&gt;session to be logged at end : True&lt;BR /&gt;session in session ager : True&lt;BR /&gt;session updated by HA peer : False&lt;BR /&gt;layer7 processing : enabled&lt;BR /&gt;URL filtering enabled : True&lt;BR /&gt;URL category : any&lt;BR /&gt;session via syn-cookies : False&lt;BR /&gt;session terminated on host : False&lt;BR /&gt;session traverses tunnel : False&lt;BR /&gt;session terminate tunnel : False&lt;BR /&gt;captive portal session : False&lt;BR /&gt;ingress interface : ethernet1/5&lt;BR /&gt;egress interface : ethernet1/6&lt;BR /&gt;session QoS rule : N/A (class 4)&lt;BR /&gt;tracker stage firewall : proxy decrypt failure&lt;BR /&gt;end-reason : decrypt-error&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why the IP "23.89.0.11" is recognized as one of the "bad" urls?&lt;BR /&gt;according to &lt;A href="https://urlfiltering.paloaltonetworks.com/query/" target="_blank" rel="noopener"&gt;https://urlfiltering.paloaltonetworks.com/query/&lt;/A&gt;&lt;BR /&gt;it has:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Category&lt;/STRONG&gt;: Unknown &lt;STRONG&gt;Category&lt;/STRONG&gt;: Medium Risk&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any tips how to understand PANOS behaviour here?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 07:58:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-policy-strange-behaviour/m-p/481225#M104142</guid>
      <dc:creator>S_Owoc</dc:creator>
      <dc:date>2022-04-20T07:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption policy - strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-policy-strange-behaviour/m-p/481395#M104162</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/138089"&gt;@S_Owoc&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I find the way that your ordering those policies to be slightly suspect. I always recommend that any no-decrypt action entry goes&amp;nbsp;&lt;STRONG&gt;above&amp;nbsp;&lt;/STRONG&gt;any decryption entry. URL categories can get screwed up for any number of reasons, for example if someone shared a malicious file through a Webex meeting, so exceptions should always go first to prevent this sort of issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 17:24:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-policy-strange-behaviour/m-p/481395#M104162</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-04-20T17:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption policy - strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-policy-strange-behaviour/m-p/481418#M104168</link>
      <description>&lt;P&gt;I agree that the order is suspect from a best practice point of view (decrypt all and only create very specific exceptions). If the plan is to only decrypt the known bad categories, then the order somehow does make sense.&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/138089"&gt;@S_Owoc&lt;/a&gt;&amp;nbsp;the behavior is normal that you see because this IP is in unknown url category and I assume you decrypt this category right? The category is unknown as when you connect to this IP by https there is nothing shown to you so there is actiually nothing to categorize for PAN-DB. Another thing is if the url really is this IP or is there maybe something else? This you might see in the URL log or if this is not the case then at least in the TLS handshake you might find it.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 18:13:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-policy-strange-behaviour/m-p/481418#M104168</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2022-04-20T18:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption policy - strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-policy-strange-behaviour/m-p/481440#M104170</link>
      <description>&lt;P&gt;Hello guys&lt;/P&gt;&lt;P&gt;I agree with you that any no-decrypt action entry goes&amp;nbsp;&lt;STRONG&gt;above&amp;nbsp;&lt;/STRONG&gt;any decryption entry, but in my case decrypt rules are applied only to "bad" traffic based on URL filtering.&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;yes, I've doublechekced and unknown url category is under 'URL_policy' which in my opinion is &lt;STRONG&gt;the explanation&lt;/STRONG&gt; of this mystery. Thank you for pointing it out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 19:09:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-policy-strange-behaviour/m-p/481440#M104170</guid>
      <dc:creator>S_Owoc</dc:creator>
      <dc:date>2022-04-20T19:09:21Z</dc:date>
    </item>
  </channel>
</rss>

