<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to exempt certain destinations from a File Blocking policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50892#M37457</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That works, thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 09 Apr 2010 17:51:35 GMT</pubDate>
    <dc:creator>ahopkins</dc:creator>
    <dc:date>2010-04-09T17:51:35Z</dc:date>
    <item>
      <title>How to exempt certain destinations from a File Blocking policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50886#M37451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I need to exempt certain sites from a policy that blocks downloads of executables, so downloads of executables are allowed from those sites. Since these are large sites that use content distribution networks, I can't create a policy with a destination IP address and a different security profile. What I would do with other brands of firewall that support FQDN object types, is reference the destination domain or URL in the policy instead of a destination IP, but Palo Alto doesn't have that feature yet. Is there a workaround I can use until Palo Alto supports the URL or FQDN object type?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Apr 2010 15:05:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50886#M37451</guid>
      <dc:creator>ahopkins</dc:creator>
      <dc:date>2010-04-01T15:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to exempt certain destinations from a File Blocking policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50887#M37452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The way to accomplish this with the current software would be to create a custom App-ID for the application/site and use that in the Application column of the policy with the appropriate file blocking profile. If you want help with the custom App-ID, post more info about the application/site and I am sure we can help you create it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Given the dynamic nature of CDNs, FQDN objects are likely problematic for this. Most CDNs will use a very short TTL which will cause the entries to be out of sync as most firewalls expect this to be updated on a frequency typically in hours, not seconds.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Apr 2010 15:21:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50887#M37452</guid>
      <dc:creator>mjacobsen</dc:creator>
      <dc:date>2010-04-01T15:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to exempt certain destinations from a File Blocking policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50888#M37453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So suppose I wanted to allow executable downloads from microsoft.com, but otherwise block them, how would I do that though App ID?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as the FQDN object types, I don't know how others such as Sonicwall do it, my guess is that it involves a lot of reverse DNS queries from the firewall. Is that feature still on track for later this year?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alex.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Apr 2010 15:30:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50888#M37453</guid>
      <dc:creator>ahopkins</dc:creator>
      <dc:date>2010-04-01T15:30:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to exempt certain destinations from a File Blocking policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50889#M37454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Attached is an example App-ID that includes two signatures. One that looks for www.microsoft.com in the host header of an HTTP request and one that looks for CN=www.microsoft.com that applies to SSL traffic, looking at the CN in the servers SSL certificate. The values for www.microsoft.com could be replaced by whatever site you were want to have a unique App-ID for. Once created, this App-ID can be used in a policy and have the associated rule could have its own set of profiles attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Apr 2010 06:26:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50889#M37454</guid>
      <dc:creator>mjacobsen</dc:creator>
      <dc:date>2010-04-03T06:26:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to exempt certain destinations from a File Blocking policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50890#M37455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I import it, I get this error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ext-mb-text" id="ext-gen272"&gt;Config loaded from appid_microsoft_xml pattern-match unexpected here. Discarding. pattern-match unexpected here. Discarding. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;It creates the new app, but it's missing the regular expression:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/" /&gt;&lt;/P&gt;&lt;P&gt;Should I enter something like ".microsoft.com" under "Pattern" to apply to all microsoft URLs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alex.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 16:32:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50890#M37455</guid>
      <dc:creator>ahopkins</dc:creator>
      <dc:date>2010-04-08T16:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to exempt certain destinations from a File Blocking policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50891#M37456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will need to be at PAN-OS version 3.1.0 or higher to use the above custom AppID as it has enhancements to support the CN in SSL cert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For PAN-OS version 3.0.x, please try the attached custom AppID.&amp;nbsp; The signature is looking for microsoft.com in the HTTP host header or the uri path.&amp;nbsp; You can almost separate the 2 matching conditions into 2 separate custom appIDs to suit your needs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: rmonvon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 19:28:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50891#M37456</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2010-04-08T19:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to exempt certain destinations from a File Blocking policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50892#M37457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That works, thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 17:51:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-exempt-certain-destinations-from-a-file-blocking-policy/m-p/50892#M37457</guid>
      <dc:creator>ahopkins</dc:creator>
      <dc:date>2010-04-09T17:51:35Z</dc:date>
    </item>
  </channel>
</rss>

