<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FQDN Policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/50585#M37246</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A fully qualified domain name (FQDN) should specify its exact location in the tree hierarchy of the Domain Name System (DNS). It specifies all domain levels, including the top-level domain and the root zone. Hence *.blackberry.com will not work as FQDN address object.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Jun 2014 20:01:40 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-06-12T20:01:40Z</dc:date>
    <item>
      <title>FQDN Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/50582#M37243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it possible to use a wildcard when creating a policy based off of a fqdn?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2014 17:50:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/50582#M37243</guid>
      <dc:creator>aguley</dc:creator>
      <dc:date>2014-06-12T17:50:54Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/50583#M37244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can add&amp;nbsp; FQDN address object into the security policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step-1&lt;/P&gt;&lt;P&gt;&lt;IMG alt="FQDN-1.JPG" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/13901_FQDN-1.JPG" style="height: 307px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step-2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="FWDN-2.JPG" class="image-1 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/13902_FWDN-2.JPG" style="height: 344px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2014 19:27:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/50583#M37244</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-06-12T19:27:24Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/50584#M37245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response.&amp;nbsp; I was wondering though is there a way I could do something like *.blackberry.com.&amp;nbsp; So if the user is hitting test123.blackberry.com one time then the next time they go to test1234.blackberry.com it will allow them to the site without having to add both sites individually?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2014 19:32:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/50584#M37245</guid>
      <dc:creator>aguley</dc:creator>
      <dc:date>2014-06-12T19:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/50585#M37246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A fully qualified domain name (FQDN) should specify its exact location in the tree hierarchy of the Domain Name System (DNS). It specifies all domain levels, including the top-level domain and the root zone. Hence *.blackberry.com will not work as FQDN address object.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2014 20:01:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/50585#M37246</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-06-12T20:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/64971#M38856</link>
      <description>&lt;P&gt;Even the thread is closed, there was a clarification published after a solution was provided and accepted: an internal verification will prohibit using wildcard characters in FQDN objects declaration - DOC-8222,&amp;nbsp;&lt;SPAN&gt;RegEx Pattern for &lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;FQDN&lt;/SPAN&gt;&lt;SPAN&gt; Address Object, now available as&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/RegEx-Pattern-for-FQDN-Address-Object/ta-p/60257" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/RegEx-Pattern-for-FQDN-Address-Object/ta-p/60257.&lt;/A&gt; When using FQDN object, one should consider the maximum number of IPs mapped to a FQDN object (DOC-3371,&amp;nbsp;&lt;SPAN&gt;How to Configure and Test &lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;FQDN&lt;/SPAN&gt;&lt;SPAN&gt; Objects, now available as&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-and-Test-FQDN-Objects/ta-p/61903" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-and-Test-FQDN-Objects/ta-p/61903)&lt;/A&gt; and the default refresh timer (30 minutes, DOC-5085,&amp;nbsp;&lt;SPAN&gt;How to Change the &lt;/SPAN&gt;&lt;SPAN class="lia-search-match-lithium"&gt;FQDN&lt;/SPAN&gt;&lt;SPAN&gt; Refresh Timers, now available at&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Change-the-FQDN-Refresh-Timers/ta-p/55533" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Change-the-FQDN-Refresh-Timers/ta-p/55533).&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2015 07:35:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/64971#M38856</guid>
      <dc:creator>andreip</dc:creator>
      <dc:date>2015-09-28T07:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/64972#M38857</link>
      <description>&lt;P&gt;If you are using URL filtering, you can create a custom URL category and apply that category to the security policy.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2015 20:41:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/64972#M38857</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2015-09-22T20:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/197653#M58750</link>
      <description>&lt;P&gt;I think this only works if you are going to use http or https .&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2018 17:00:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/197653#M58750</guid>
      <dc:creator>pvargas</dc:creator>
      <dc:date>2018-01-30T17:00:33Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/248490#M70665</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For FQDN objects firewall does the nslookup at defined interval (default 30 minutes) to verify the IP address. Is this true for custom URL category as well?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Deepak Kumar&lt;/P&gt;</description>
      <pubDate>Fri, 01 Feb 2019 15:51:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/248490#M70665</guid>
      <dc:creator>Kumade</dc:creator>
      <dc:date>2019-02-01T15:51:45Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/248736#M70754</link>
      <description>&lt;P&gt;No.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With FQDN object your firewall is evaluating the connection at the very first packet, it will check if the destination address of the SYN (for example) is matching the returned IP address for the FQDN object.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With URL category, you need to allow any as destination to allow the connection to establish, once the application data start to pass through the firewall it will evaluate the rulebase again and if address from the actual data is matching the rule the traffic will be allowed to continue. If not - the firewall will deny the rest of the connection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the connection is encrypted with SSL/TLS I believe the firewall will use the server certificate&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 14:34:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fqdn-policy/m-p/248736#M70754</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2019-02-04T14:34:37Z</dc:date>
    </item>
  </channel>
</rss>

