<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Wildcards in URL filtering for SSL-decrypt bypass in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-url-filtering-for-ssl-decrypt-bypass/m-p/29767#M21752</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, so this is driving me mad and I'm obviously missing something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've created a custom URL category in which I wish to drop URLs that will bypass SSL decryption.&amp;nbsp; In this I want to use wildcards, so that all sites for a particular company can be bypassed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For the sake of example, let's say the site I want to get to unencrypted is &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://www.microsoft.com"&gt;https://www.microsoft.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the URL category I've added *.microsoft.com using the wildcard EXACTLY as documented in the URL_Categorzation_PANOS-RevC.pdf document posted on this site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The custom URL category is then referenced in a rule in my Decryption policy, with action no-decrypt and type ssl-forward-proxy set appropriately&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything has then been committed back to the PANOS firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result?&amp;nbsp; URLs matching the wildcard are still being decrypted.&amp;nbsp; The firewall is completely ignoring the bypass rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone got any idea why?&amp;nbsp; The CLI "Test" command doesn't even recognise my custom URL categories, so that's no help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall is running 5.0.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 30 Aug 2013 11:03:30 GMT</pubDate>
    <dc:creator>David_Hulse</dc:creator>
    <dc:date>2013-08-30T11:03:30Z</dc:date>
    <item>
      <title>Wildcards in URL filtering for SSL-decrypt bypass</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-url-filtering-for-ssl-decrypt-bypass/m-p/29767#M21752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, so this is driving me mad and I'm obviously missing something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've created a custom URL category in which I wish to drop URLs that will bypass SSL decryption.&amp;nbsp; In this I want to use wildcards, so that all sites for a particular company can be bypassed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For the sake of example, let's say the site I want to get to unencrypted is &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://www.microsoft.com"&gt;https://www.microsoft.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the URL category I've added *.microsoft.com using the wildcard EXACTLY as documented in the URL_Categorzation_PANOS-RevC.pdf document posted on this site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The custom URL category is then referenced in a rule in my Decryption policy, with action no-decrypt and type ssl-forward-proxy set appropriately&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything has then been committed back to the PANOS firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result?&amp;nbsp; URLs matching the wildcard are still being decrypted.&amp;nbsp; The firewall is completely ignoring the bypass rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone got any idea why?&amp;nbsp; The CLI "Test" command doesn't even recognise my custom URL categories, so that's no help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall is running 5.0.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 11:03:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-url-filtering-for-ssl-decrypt-bypass/m-p/29767#M21752</guid>
      <dc:creator>David_Hulse</dc:creator>
      <dc:date>2013-08-30T11:03:30Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in URL filtering for SSL-decrypt bypass</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-url-filtering-for-ssl-decrypt-bypass/m-p/29768#M21753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to add &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;*.microsoft.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;*&lt;SPAN class="GINGER_SOFATWARE_correct"&gt;.&lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFATWARE_correct"&gt;microsoft&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFATWARE_correct"&gt;.&lt;/SPAN&gt;*&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;*&lt;SPAN class="GINGER_SOFATWARE_correct"&gt;.&lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFATWARE_correct"&gt;microsoft&lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFATWARE_correct"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;*/&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;*&lt;SPAN class="GINGER_SOFATWARE_correct"&gt;.&lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFATWARE_correct"&gt;microsoft&lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFATWARE_correct"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;*/*&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please go through below mentioned discussion and documents, hope it will help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/message/27930"&gt;.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-2008"&gt;Controlling SSL Decryption&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 14:39:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-url-filtering-for-ssl-decrypt-bypass/m-p/29768#M21753</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2013-08-30T14:39:51Z</dc:date>
    </item>
  </channel>
</rss>

