<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wildcards in address objects in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33993#M24926</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this works, but only for HTTP. How to make this work for FTP?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 03 May 2013 15:29:24 GMT</pubDate>
    <dc:creator>ksuuk</dc:creator>
    <dc:date>2013-05-03T15:29:24Z</dc:date>
    <item>
      <title>Wildcards in address objects</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33986#M24919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Instead of creating several address objects for the many MS update servers available, and then creating a group to plug into a security policy that allows my WSUS server to get updates, is there a way to use wildcards in the address objects?&amp;nbsp; MS updates lists multiple locations available for updates:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://windowsupdate.microsoft.com"&gt;http://windowsupdate.microsoft.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://*.windowsupdate.microsoft.com"&gt;http://*.windowsupdate.microsoft.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://*.windowsupdate.microsoft.com"&gt;https://*.windowsupdate.microsoft.com&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://*.update.microsoft.com"&gt;http://*.update.microsoft.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A class="jive-link-external-small" href="https://*.update.microsoft.com"&gt;https://*.update.microsoft.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A class="jive-link-external-small" href="http://*.windowsupdate.com"&gt;http://*.windowsupdate.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A class="jive-link-external-small" href="http://download.windowsupdate.com"&gt;http://download.windowsupdate.com&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://download.microsoft.com"&gt;http://download.microsoft.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://*.download.windowsupdate.com"&gt;http://*.download.windowsupdate.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://stats.update.microsoft.com"&gt;http://stats.update.microsoft.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://ntservicepack.microsoft.com"&gt;http://ntservicepack.microsoft.com&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This list could be condensed down to perhaps four address objects:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;*.windowsupdate.microsoft.com&lt;/LI&gt;&lt;LI&gt;*.update.microsoft.com&lt;/LI&gt;&lt;LI&gt;*.download.windowsupdate.com&lt;/LI&gt;&lt;LI&gt;*.windowsupdate.com&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;which could be put into a address group and use the group in the security policy destination.&amp;nbsp; Then I only have to move objects into and out of the group as MS changes and I don't have to worry about changing a rule.&amp;nbsp; If they add or remove servers within the wildcard domains, then I don't need to make any changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bart&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Apr 2012 21:04:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33986#M24919</guid>
      <dc:creator>blwallace</dc:creator>
      <dc:date>2012-04-19T21:04:19Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in address objects</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33987#M24920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bart,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume following is what you are trying to do:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you log into the WEB UI:- &lt;/P&gt;&lt;P&gt;Objects----&amp;gt; Addresses ---&amp;gt;Click Add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would like to add the FQDN as a wildcard address.&lt;/P&gt;&lt;P&gt;Name:- testobject&lt;/P&gt;&lt;P&gt;Type: FQDN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *.windowsupdate.microsoft.com&amp;nbsp; &lt;/P&gt;&lt;P&gt;SEE ATTACHMENT :- wildcard.PNG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above FQDN syntax is not valid and cannot be used.&lt;/P&gt;&lt;P&gt;If this is what you are trying to do, Wildcards in address objects cannot be used (at this time).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would have to create multiple addresses and encapsulate them in a group and bind it to the policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Apr 2012 22:19:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33987#M24920</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-04-19T22:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in address objects</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33988#M24921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I had tried that already and discovered I couldn't do it.&amp;nbsp; I'm wondering if there is any other way to accomplish this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Apr 2012 22:30:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33988#M24921</guid>
      <dc:creator>blwallace</dc:creator>
      <dc:date>2012-04-19T22:30:31Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in address objects</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33989#M24922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bart,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;You can use those wildcards in the URL filtering profile and can have in the Explicit allow/block list.The URL filtering Profile can then be applied to the policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Go to OBJECTS--&amp;gt;URL Filtering Profile&lt;BR /&gt;List teh following URLS in the Allow list:- &lt;BR /&gt;*.windowsupdate.microsoft.com&lt;/P&gt;&lt;P&gt;*.update.microsoft.com&lt;/P&gt;&lt;P&gt;*.download.windowsupdate.com&lt;/P&gt;&lt;P&gt;*.windowsupdate.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see the attcment :- url-filtering.PNG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way you can use the Wildcards BUT to only ALLOW AND DENY.&amp;nbsp; &lt;BR /&gt;Let me know if that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Apr 2012 23:16:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33989#M24922</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-04-19T23:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in address objects</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33990#M24923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had looked at that before writing the post and was wondering if that wouldn't work.  I'll give it a try.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Apr 2012 23:27:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33990#M24923</guid>
      <dc:creator>blwallace</dc:creator>
      <dc:date>2012-04-19T23:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in address objects</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33991#M24924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A custom url-filtering along with only allow appid:ms-update (and set service:default-application) should do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A sidenote is that SSL decryption doesnt work for ms update traffic (since they use their own built in certs and doesnt allow any other, at least if you use WSUS or such) so Im not sure how widely open the above rule might be in reality.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im not sure how you can in a good way limit it down further. Perhaps adding dstip:65.55.27.0/24 but these ip's I guess might differ from time to time along with being different depending on when and from where you query the DNS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: Seems it was true regarding various ip's for windowsupdate... so make that dstip:65.55.0.0/16 :smileysilly:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Apr 2012 07:40:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33991#M24924</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-04-20T07:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in address objects</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33992#M24925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;I used a Custom URL Category along with ms-update application filtering but it was not enough to just list the wildcard versions of the FQDN's, I also had to list the FQDN without the *.&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;ie. This is what worked for me with PANOS 4.1.10 &lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;windowsupdate.microsoft.com&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;*.windowsupdate.microsoft.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;update.microsoft.com&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;*.update.microsoft.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;download.windowsupdate.com&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;*.download.windowsupdate.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;windowsupdate.com&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;*.windowsupdate.com&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Apr 2013 23:00:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33992#M24925</guid>
      <dc:creator>MichaelBurgener</dc:creator>
      <dc:date>2013-04-23T23:00:35Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in address objects</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33993#M24926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this works, but only for HTTP. How to make this work for FTP?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 15:29:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33993#M24926</guid>
      <dc:creator>ksuuk</dc:creator>
      <dc:date>2013-05-03T15:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcards in address objects</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33994#M24927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you want to limit which FTP sites should be possible to visit you need to use FQDN or setup a dynamic address object which you then "feed" by a script running on some server (to inform the PA device which ip addresses this current adress object/group should point at).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 May 2013 22:06:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildcards-in-address-objects/m-p/33994#M24927</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-05-04T22:06:39Z</dc:date>
    </item>
  </channel>
</rss>

