<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Traffic getting hits on non-allowed URLs in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-getting-hits-on-non-allowed-urls/m-p/529934#M109370</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been experiencing a situation where http and https traffic are getting hits on 1 of my security policies which is configured with Custom URL Category.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It looks something like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source Zone: Internal&lt;/P&gt;
&lt;P&gt;Source: Internal Network&lt;/P&gt;
&lt;P&gt;Destination Zone: External&lt;/P&gt;
&lt;P&gt;Destination: Any&lt;/P&gt;
&lt;P&gt;Application: Any&lt;/P&gt;
&lt;P&gt;Service: HTTP &amp;amp; HTTPS&lt;/P&gt;
&lt;P&gt;URL Category: *.testing.com &amp;amp; testing.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have seen several discussions pertaining to similar issues but none of them are really the same. On traffic logs I am seeing application as insufficient-data, incomplete and being resolved to SSL / web-browsing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am hesitant to disable the rule as this device is serving a large amount of users and I do not wish to disrupt internet connectivity.&lt;/P&gt;</description>
    <pubDate>Mon, 06 Feb 2023 02:51:14 GMT</pubDate>
    <dc:creator>KelvynYeo</dc:creator>
    <dc:date>2023-02-06T02:51:14Z</dc:date>
    <item>
      <title>Traffic getting hits on non-allowed URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-getting-hits-on-non-allowed-urls/m-p/529934#M109370</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been experiencing a situation where http and https traffic are getting hits on 1 of my security policies which is configured with Custom URL Category.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It looks something like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source Zone: Internal&lt;/P&gt;
&lt;P&gt;Source: Internal Network&lt;/P&gt;
&lt;P&gt;Destination Zone: External&lt;/P&gt;
&lt;P&gt;Destination: Any&lt;/P&gt;
&lt;P&gt;Application: Any&lt;/P&gt;
&lt;P&gt;Service: HTTP &amp;amp; HTTPS&lt;/P&gt;
&lt;P&gt;URL Category: *.testing.com &amp;amp; testing.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have seen several discussions pertaining to similar issues but none of them are really the same. On traffic logs I am seeing application as insufficient-data, incomplete and being resolved to SSL / web-browsing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am hesitant to disable the rule as this device is serving a large amount of users and I do not wish to disrupt internet connectivity.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 02:51:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-getting-hits-on-non-allowed-urls/m-p/529934#M109370</guid>
      <dc:creator>KelvynYeo</dc:creator>
      <dc:date>2023-02-06T02:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic getting hits on non-allowed URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-getting-hits-on-non-allowed-urls/m-p/530004#M109381</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/191156"&gt;@KelvynYeo&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Whenever you use categories as match criteria, the first such rule will get hit in the rulebase as the firewall&amp;nbsp;&lt;EM&gt;has&amp;nbsp;&lt;/EM&gt;to allow enough traffic to pass to see what the domain is going to be. Once it can actually identify the domain in question, it'll continue through the rulebase as you'd expect to verify if there's a matching entry.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 15:03:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-getting-hits-on-non-allowed-urls/m-p/530004#M109381</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-02-06T15:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic getting hits on non-allowed URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-getting-hits-on-non-allowed-urls/m-p/530011#M109385</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Would the best approach to this situation be tightening down the rule with FQDN objects rather than URL category?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As I have mentioned, there are actually a huge load of traffic that passes through this security rule and I am seeing tcp-fin for session end even for those mismatched URLs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is concerning as it would mean that sessions are being established with this rule and it is not supposed to be the case. This is a legacy rule that was migrated from CISCO ASA and we are looking to retain it as part of user's requirement.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 17:22:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-getting-hits-on-non-allowed-urls/m-p/530011#M109385</guid>
      <dc:creator>KelvynYeo</dc:creator>
      <dc:date>2023-02-06T17:22:13Z</dc:date>
    </item>
  </channel>
</rss>

