<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow download of file types that show as ZIP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46876#M34454</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi...For ﻿Symantec updates, What do you mean by it depends on HTTP or FTP? Have you try allowing app=symantec-av-update because that should cover the download for Symantec updates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the other file types like .as3a, you can try to match on its file extension by creating a custom application. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Enclosed is a custom appID to look for .jpg images inside of HTTP traffic.&amp;nbsp; This custom app was written for PAN-OS 3.1.x but you can reference its signature to create for version 4.0 or 4.1.&amp;nbsp; The signature is looking in the URI path and matching on&amp;nbsp; the string ‘\.jpg HTTP’ without the quote.&amp;nbsp; Typically the web request would look like this:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;GET /images/twitter_corp.jpg HTTP/1.1\r\n&lt;/P&gt;&lt;P class="MsoNormal"&gt;GET /images/logo.jpg HTTP/1.1\r\n&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;You can import this appID into the PAN device and test.&amp;nbsp; Once verified, you can clone the app and change the app to match extensions like .as3a, .scr, .pif, etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 14 Dec 2011 03:06:59 GMT</pubDate>
    <dc:creator>rmonvon</dc:creator>
    <dc:date>2011-12-14T03:06:59Z</dc:date>
    <item>
      <title>Allow download of file types that show as ZIP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46875#M34453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have had a few instances where I've needed to allow certain files types through the data filter.&amp;nbsp; One annoying case was native Office 2007/2010 documents that end in x.&amp;nbsp; What I did was add it to my file blocking profile with the action of ALERT.&amp;nbsp; This is now letting them in.&amp;nbsp; Sometimes I actually have a FQDN or IPs that I can use to allow EVERYTHING in from certain sites, but sometimes that doesn't work.&amp;nbsp; I have 2 examples where I am having issues with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First, Symantec AV updates.&amp;nbsp; We have contracted employees working in my school district who have their employer-provided computers.&amp;nbsp; As we don't manage them, their Symantec AV updates over the Web.&amp;nbsp; However, these are ZIPs and are blocked.&amp;nbsp; I tried allowing Symantec-AV-update, but that also depends on HTTP and FTP.&amp;nbsp; I couldn't find a good way to use a policy to allow that.&amp;nbsp; Especially as I don't have a FQDN or IP to allow stuff in explicitly.&amp;nbsp; The servers I see getting blocked resolve to something like axx-xx-xx-xx.deploy.akamaitechnologies.com.&amp;nbsp; I've seen other stuff using these exact same servers, so how do I deal with that?&amp;nbsp; I don't know how many of these servers might be accessed by SAV, either.&amp;nbsp; Anyone else dealt with this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally, my latest is an uknown file type, used for educational software.&amp;nbsp; Some of the blocks (ZIP, of course) show Akamai servers, but there are others also.&amp;nbsp; This file type is as3a.&amp;nbsp; As PA doesn't list that one, can't use my other file blocking technique to just allow all .as3a files either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any help you may have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Geoff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Dec 2011 19:35:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46875#M34453</guid>
      <dc:creator>gsvarney</dc:creator>
      <dc:date>2011-12-13T19:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: Allow download of file types that show as ZIP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46876#M34454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi...For ﻿Symantec updates, What do you mean by it depends on HTTP or FTP? Have you try allowing app=symantec-av-update because that should cover the download for Symantec updates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the other file types like .as3a, you can try to match on its file extension by creating a custom application. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Enclosed is a custom appID to look for .jpg images inside of HTTP traffic.&amp;nbsp; This custom app was written for PAN-OS 3.1.x but you can reference its signature to create for version 4.0 or 4.1.&amp;nbsp; The signature is looking in the URI path and matching on&amp;nbsp; the string ‘\.jpg HTTP’ without the quote.&amp;nbsp; Typically the web request would look like this:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;GET /images/twitter_corp.jpg HTTP/1.1\r\n&lt;/P&gt;&lt;P class="MsoNormal"&gt;GET /images/logo.jpg HTTP/1.1\r\n&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;You can import this appID into the PAN device and test.&amp;nbsp; Once verified, you can clone the app and change the app to match extensions like .as3a, .scr, .pif, etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 03:06:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46876#M34454</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2011-12-14T03:06:59Z</dc:date>
    </item>
    <item>
      <title>Re: Allow download of file types that show as ZIP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46877#M34455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the info.&amp;nbsp; Actually, when I create a policy to allow the application symantec-av-updates and commit, the commit window tells me at the end that my policy depends on ftp and web.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll look into the suggestion for creating a custom app for file types. Maybe I'll need to do something similar to look for a specific string in the URI for SAV updates also?&amp;nbsp; I had hoped that the application symantec-av-updates would handle the entire update requirement instead of having to add additional apps or services which makes it all the more difficult.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Dec 2011 18:05:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46877#M34455</guid>
      <dc:creator>gsvarney</dc:creator>
      <dc:date>2011-12-16T18:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: Allow download of file types that show as ZIP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46878#M34456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you describe is application dependency.&amp;nbsp; Since Symantec update is using web-browsing (HTTP) and FTP, we have to permit those parent apps in order to detect the child app.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe you can ask Symantec to provide a list of destinations that represent their update servers, or a URL, etc.&amp;nbsp; Then we can define a policy to match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Dec 2011 19:32:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46878#M34456</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2011-12-16T19:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: Allow download of file types that show as ZIP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46879#M34457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am having the same problem trying to allow Symantec AV update (only) through.&amp;nbsp;&amp;nbsp; My default access level is BLOCKED.&amp;nbsp; But I want to allow Symantec AV updates to work on machines otherwise blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So to expand on &lt;A href="https://live.paloaltonetworks.com/people/rmonvon" id="jive-23578,753,752,117,173,901"&gt;rmonvon&lt;/A&gt;'s comment, create a rule higher in your rulebase than the rule that normally allows web access to your LAN/trusted network (and perhaps from the DMZ too..)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The source is trusted / ANY while the destinations are untrusted and two FQDN host objects.&amp;nbsp; Create one each for these;&lt;/P&gt;&lt;P&gt;liveupdate.symantecliveupdate.com&lt;BR /&gt;liveupdate.symantec.com&lt;/P&gt;&lt;P&gt;update.symantec.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The application becomes ANY and the service ANY. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because this is higher in your rule base, it allows symantec-av-update to work just to these sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At least that is the theory.&amp;nbsp;&amp;nbsp; In practice, the traffic is still blocked.&amp;nbsp; The HTTP/FTP connection sends out a SYN packet, which is blocked by the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Reading this post explains how FQDN works:&amp;nbsp; &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/message/12006#12006"&gt;https://live.paloaltonetworks.com/message/12006#12006&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I do an nslookup liveupdate.symantecliveupdate.com from my PC, I get an akamia.net address, followed by several ip addresses, and several aliases.&amp;nbsp;&amp;nbsp; If I perform the same lookup on different DNS server or just wait, the resulting IP addresses are completely different.&amp;nbsp; There are a huge number of them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By understanding the way PAs FQDN objects work, and what Symantec is doing, we can see that a FQDN rule will not work here.... That is.. Unless we modify the DNS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we are using DNS Proxy in the PA, we can point liveupdate.symantecliveupdate.com to a select few IP addresses that Symantec uses.&amp;nbsp; Then we can modify our PA security rule to allow access to just those IP addresses (no reason to use FQDN here.)&amp;nbsp;&amp;nbsp; If we run our own DNS servers internally, such as bind or AD DNS, we can add the zone liveupdate.symantecliveupdate.com, and create A records for just a few IP addresses.&amp;nbsp;&amp;nbsp; We do not want to create a DNS zone for symantec.com, we want the ENTIRE name update.symantec.com, as we only want to control that part of the domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The downside of this is that you will need to check something like Google DNS 8.8.8.8 and make sure that your IPs are still valid.&amp;nbsp;&amp;nbsp; If you do not do this from time to time, you will find yourself blocking Live Update by blackholing it.&amp;nbsp; So in my case, I've only took control over one of the three FQDNs that Symantec uses for live update.&amp;nbsp; I've setup liveupdate.symantecliveupdate.com, which is the first name that the current version of live update tries.&amp;nbsp;&amp;nbsp; If that fails, it will try liveupdate.symantec.com.&amp;nbsp; So if my trick quits working, I should see symantec-av-update failures against liveupdate.symantec.com.&amp;nbsp;&amp;nbsp; That should catch my eye as I monitor the PA logs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2012 18:42:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46879#M34457</guid>
      <dc:creator>EdwinD</dc:creator>
      <dc:date>2012-05-30T18:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: Allow download of file types that show as ZIP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46880#M34458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What about something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srczone: internal&lt;/P&gt;&lt;P&gt;sourceip: any (or just your updateserver so not all clients must reach internet)&lt;/P&gt;&lt;P&gt;dstzone: external&lt;/P&gt;&lt;P&gt;dstip: any&lt;/P&gt;&lt;P&gt;appid: symantec-av-update, web-browsing (due to dependency for web-browsing - hopefully this is fixed in PANOS 5.x)&lt;/P&gt;&lt;P&gt;service: application-default (could also be narrowed down to just TCP80)&lt;/P&gt;&lt;P&gt;option: url-category: Symantec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where your custom url-category Symantec contains:&lt;/P&gt;&lt;P&gt;liveupdate.symantecliveupdate.com&lt;BR /&gt;liveupdate.symantec.com&lt;/P&gt;&lt;P&gt;update.symantec.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and configure your symantec clients to only use http/https (well at least not ftp) for updates (or for that matter direct your clients to a local server and only allow this particular server to sync its db with symantec on the internet)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2012 19:38:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46880#M34458</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-05-30T19:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: Allow download of file types that show as ZIP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46881#M34459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That fails to install.&amp;nbsp; It says that FTP is required for symantec-av-update.&amp;nbsp; I like the idea of using the Web filter to confine the destination, but that would result in blocked FTP events in my firewall logs as you &lt;SPAN style="font-size: 11pt; line-height: 115%; font-family: &amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;"&gt;allude &lt;/SPAN&gt;to.&amp;nbsp;&amp;nbsp; For my environment, my method keeps the blocked logs clean.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;and configure your symantec clients to only use http/https (well at&amp;nbsp; least not ftp) for updates (or for that matter direct your clients to a&amp;nbsp; local server and only allow this particular server to sync its db with&amp;nbsp; symantec on the internet)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can point my managed machines to use internal live update or just use HTTP, that's not a problem.&amp;nbsp; I'm already using internal update servers (GUP, Management server..)&amp;nbsp; and I have a live update server installed but not in use.&amp;nbsp; I can't point unmanaged laptops to my internal live update server, though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suppose I could point the live update DNS IP address to my internal live update server.&amp;nbsp;&amp;nbsp; However, then I would have to configure my internal live update server to download everything that Symantec offers through live update.&amp;nbsp; That includes Backup Exec updates, System Recovery 2011 updates, Brightmail updates.&amp;nbsp;&amp;nbsp; We are talking many hundreds of GB of updates.&amp;nbsp; If I don't, then those products will no longer update.&amp;nbsp;&amp;nbsp; We do run those products.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2012 21:52:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-download-of-file-types-that-show-as-zip/m-p/46881#M34459</guid>
      <dc:creator>EdwinD</dc:creator>
      <dc:date>2012-05-30T21:52:07Z</dc:date>
    </item>
  </channel>
</rss>

