<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using a large destination-domain blacklist in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-large-destination-domain-blacklist/m-p/40105#M29409</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I hear ya man, there should be a DNS domain blacklist (dynamic list like Dynamic Block Lists). DNS blocking is really the only way you can do it. Object FQDN lookups won't work and don't scale. They have to constantly refresh the data at regular intervals, but malware domains can have slow TTLs, lower than the firewall and will skirt through. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;URL filtering only filters web traffic and the traffic may not be web based. There are a lot of domains I would like to block at the IP level in the event the traffic is ssh, icmp tunneling, etc.Still trying to figure that one out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 05 Dec 2014 21:00:15 GMT</pubDate>
    <dc:creator>rbergen</dc:creator>
    <dc:date>2014-12-05T21:00:15Z</dc:date>
    <item>
      <title>Using a large destination-domain blacklist</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-large-destination-domain-blacklist/m-p/40103#M29407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am considering the use of a domain name blacklist published by the DNS-BH project in a custom URL category that will block access to any of the included domains.&amp;nbsp; However, the list is over 12K entries long, which obviously doubles when I add an additional wildcard entry for each.&amp;nbsp; So, i have a few questions.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First, does it make sense to try to achieve my goal of blocking http to known malware sites using this method?&amp;nbsp; Is there a max URL category list limit what this would exceed, or will there be a performance hit related to comparing URL domain against a 24K list that makes this option unrealistic (on PA-200 up to PA-5020)?&amp;nbsp; Can an update of the custom URL category list be automated via the CLI from a text file?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, If I wanted to block access to these domains for more than just http traffic, what other options do i have?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 01:14:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-large-destination-domain-blacklist/m-p/40103#M29407</guid>
      <dc:creator>schaleg</dc:creator>
      <dc:date>2012-08-30T01:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: Using a large destination-domain blacklist</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-large-destination-domain-blacklist/m-p/40104#M29408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If your purpose is to block malware sites, the best way would be to do it by blocking the category "malware-sites" and use the dynamic URL filtering. The firewall will determine the URL is a malware website are not by doing search on the cloud database (brightcloud.com). The cloud database gets updated frequently with all kinds of URL's. You can visit brightcloud.com and test a few URL's that are present in the dns-bh list.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 08:03:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-large-destination-domain-blacklist/m-p/40104#M29408</guid>
      <dc:creator>sdurga</dc:creator>
      <dc:date>2012-08-30T08:03:59Z</dc:date>
    </item>
    <item>
      <title>Re: Using a large destination-domain blacklist</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-a-large-destination-domain-blacklist/m-p/40105#M29409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I hear ya man, there should be a DNS domain blacklist (dynamic list like Dynamic Block Lists). DNS blocking is really the only way you can do it. Object FQDN lookups won't work and don't scale. They have to constantly refresh the data at regular intervals, but malware domains can have slow TTLs, lower than the firewall and will skirt through. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;URL filtering only filters web traffic and the traffic may not be web based. There are a lot of domains I would like to block at the IP level in the event the traffic is ssh, icmp tunneling, etc.Still trying to figure that one out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Dec 2014 21:00:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-a-large-destination-domain-blacklist/m-p/40105#M29409</guid>
      <dc:creator>rbergen</dc:creator>
      <dc:date>2014-12-05T21:00:15Z</dc:date>
    </item>
  </channel>
</rss>

