<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynamic URL Filtering when policy matching on URL in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-url-filtering-when-policy-matching-on-url/m-p/15214#M11168</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Liam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may have noticed it already, but the aforementioned bug was addressed in the 4.1.3 release, which is now generally available.&amp;nbsp; If you are using URL categories as part of your match criteria and would like to enable dynamic lookups as part of that process, you can use the following CLI command to do so:&lt;/P&gt;&lt;PRE style="color:#000000;text-align:-webkit-auto;background-color:#ffffff"&gt;set devconfig setting url dynamic-url yes
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Doris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 09 Mar 2012 06:55:33 GMT</pubDate>
    <dc:creator>dyang</dc:creator>
    <dc:date>2012-03-09T06:55:33Z</dc:date>
    <item>
      <title>Dynamic URL Filtering when policy matching on URL</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-url-filtering-when-policy-matching-on-url/m-p/15211#M11165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We're using dynamic URL filtering (ie the "cloud" database") within our URL-filtering profiles.&amp;nbsp; Within PAN-OS 4.1 there is now the option to match on URL category within security policies, but no checkbox there to use the Dynamic Filtering.&amp;nbsp; So, if I try and access a URL thats not in the local database, does the firewall still go and query the cloud for that policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tks&lt;/P&gt;&lt;P&gt;Liam.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 15:19:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dynamic-url-filtering-when-policy-matching-on-url/m-p/15211#M11165</guid>
      <dc:creator>LCMember2860</dc:creator>
      <dc:date>2012-02-16T15:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic URL Filtering when policy matching on URL</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-url-filtering-when-policy-matching-on-url/m-p/15212#M11166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the dynamic filtering is a global option in order to if you want to "leak" to the cloud which urls your clients are browsing to or not (along with to get a better hitrate since the downloadable db of url-categories are just the top1000 or similar per category).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I could agree that it might be a nice feature to be able to do this both on global but also at security rule level - the question here will then be, which setting will be the judging one? Will the global setting overrule the local security rule setting or would the local security rule setting overrule the global setting?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 21:02:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dynamic-url-filtering-when-policy-matching-on-url/m-p/15212#M11166</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-02-16T21:02:34Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic URL Filtering when policy matching on URL</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-url-filtering-when-policy-matching-on-url/m-p/15213#M11167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Liam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Excellent point - we also discovered this recently and the bug fix is targeted for the next maintenance release.&amp;nbsp; You should find more information in the release notes once it is available, but I'll also post more information at that time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Doris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 21:55:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dynamic-url-filtering-when-policy-matching-on-url/m-p/15213#M11167</guid>
      <dc:creator>dyang</dc:creator>
      <dc:date>2012-02-16T21:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic URL Filtering when policy matching on URL</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-url-filtering-when-policy-matching-on-url/m-p/15214#M11168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Liam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may have noticed it already, but the aforementioned bug was addressed in the 4.1.3 release, which is now generally available.&amp;nbsp; If you are using URL categories as part of your match criteria and would like to enable dynamic lookups as part of that process, you can use the following CLI command to do so:&lt;/P&gt;&lt;PRE style="color:#000000;text-align:-webkit-auto;background-color:#ffffff"&gt;set devconfig setting url dynamic-url yes
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Doris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Mar 2012 06:55:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dynamic-url-filtering-when-policy-matching-on-url/m-p/15214#M11168</guid>
      <dc:creator>dyang</dc:creator>
      <dc:date>2012-03-09T06:55:33Z</dc:date>
    </item>
  </channel>
</rss>

