<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA-500 6.1.4 Policy and URL filtering in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66715#M39298</link>
    <description>&lt;P&gt;The firewall is a security tool. &amp;nbsp;We should be first asking what's important...What's critical to have. &amp;nbsp;It's annoying that everytime I'm on a TAC call I usually get the "you really shouldn't log on session start" comment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem with not logging on session start is you're only notified when the session has ended (obvious.) &amp;nbsp;The problem with saying "only use it for troubleshooting" is how do you troubleshoot something in the past?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Say for instance an FTP session, that session could be open for minutes, hours, or even days. &amp;nbsp;You'd never be notified about that traffic until the session was closed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Every one of my rules logs session start. &amp;nbsp;Over 20k user network and we generate about 3 million logs a day. &amp;nbsp;Our Panorama has 2TB of storage and we just shy of 2 months of on box retention.&lt;/P&gt;</description>
    <pubDate>Fri, 16 Oct 2015 12:53:17 GMT</pubDate>
    <dc:creator>Brandon_Wertz</dc:creator>
    <dc:date>2015-10-16T12:53:17Z</dc:date>
    <item>
      <title>PA-500 6.1.4 Policy and URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66698#M39286</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I have very big problem with my firewall. I have&amp;nbsp;a few URL filtering rules which I block some of sites.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;1. Allow social network(linkedin)&amp;nbsp;block youtube -&amp;gt; name AllowSN&lt;/P&gt;
&lt;P&gt;2. Allow youtube block social network(linkedin) -&amp;gt; name AllowYT&lt;/P&gt;
&lt;P&gt;3 and so on&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And I create for this URL filtering policies where specific users(by ldap) can access to specif sites.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;1. AD group allow_yt -&amp;gt; url filtering AllowYT&lt;/P&gt;
&lt;P&gt;2. AD group allow_sn -&amp;gt; url filtering AllowSN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And I have users who is in all of this groups(allow_yt,allow_sn). In this hierarchy they can access to YT but not social network but when I change policies order they can get to SN but not to YT &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can someone provide information How can I improve my policies that users which are in both group can access to&amp;nbsp;YT and social network?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for help.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 06:51:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66698#M39286</guid>
      <dc:creator>ITBT</dc:creator>
      <dc:date>2015-10-16T06:51:12Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 6.1.4 Policy and URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66699#M39287</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;the security policy will be processed from the top to bottom and once a positive match (source+destination+source user/group+application/port) is made, the security policy will be applied and any subsequent rules are not checked&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so what you could try is to create a rule at the top that allows application youtube for the youtube group, then add the rule that allows youtube URL filtering below and then social networking&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. AD group allow_yt &amp;nbsp;-&amp;gt;&amp;nbsp;application YouTube, NO url filtering&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;2. AD group allow_yt -&amp;gt; url filtering AllowYT&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;3. AD group allow_sn -&amp;gt; url filtering AllowSN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 08:47:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66699#M39287</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2015-10-16T08:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 6.1.4 Policy and URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66702#M39289</link>
      <description>&lt;P&gt;Thanks for answer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But how does it work? If security policy are processed from thr top to bottom then someone who is in the group allow_yt and allow_sn will be access to YT but not to SN.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or am I wrong?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 09:48:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66702#M39289</guid>
      <dc:creator>ITBT</dc:creator>
      <dc:date>2015-10-16T09:48:39Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 6.1.4 Policy and URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66705#M39290</link>
      <description>&lt;P&gt;Try chaning the order&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. AD group allow_yt &amp;nbsp;-&amp;gt;&amp;nbsp;application YouTube, NO url filtering&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;2. AD group allow_sn -&amp;gt; url filtering AllowSN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;3. &lt;SPAN style="line-height: 20px;"&gt;AD group allow_yt -&amp;gt; url filtering AllowYT&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 10:23:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66705#M39290</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2015-10-16T10:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 6.1.4 Policy and URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66707#M39291</link>
      <description>&lt;P&gt;You can start with something like this and then tighten it down (allow only limited applications like youtube, web-browsing, ssl etc from &lt;A href="http://www.youtube.com" target="_blank"&gt;www.youtube.com&lt;/A&gt; and permit only limited social-networking FQDN's etc).&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/717i5E8D28DE1F987D1B/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="example.png" title="example.png" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And change User-Any to your AD group accordingly.&lt;/P&gt;
&lt;P&gt;So first 2 rules source user is youtube group and third is social networkng group.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 10:28:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66707#M39291</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2015-10-16T10:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 6.1.4 Policy and URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66709#M39292</link>
      <description>&lt;P&gt;Thanks for help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;&lt;A id="link_9" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608" target="_self"&gt;reaper&lt;/A&gt;&amp;nbsp;it doesn't work&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;&lt;A id="link_17" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20090" target="_self"&gt;pakumar&lt;/A&gt;&amp;nbsp;&lt;SPAN&gt;it doesn't work&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;&lt;A id="link_21" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603" target="_self"&gt;Raido&lt;/A&gt;&amp;nbsp;but I use this type of configuration. So do you think I shoud change to URL Category?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/718i32A27BBA703CD3C1/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="PAN.PNG" title="PAN.PNG" /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 11:37:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66709#M39292</guid>
      <dc:creator>ITBT</dc:creator>
      <dc:date>2015-10-16T11:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 6.1.4 Policy and URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66710#M39293</link>
      <description>&lt;P&gt;Security profiles is always my first choice because it keeps security rules cleaner.&lt;/P&gt;
&lt;P&gt;But with your requirement you should create security profile and AD group for every possible setup.&lt;/P&gt;
&lt;P&gt;- permit youtube&lt;/P&gt;
&lt;P&gt;- permit social&lt;/P&gt;
&lt;P&gt;- permit youtube and social&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Pao (and firewalls in general) evaluate rules from top to bottom.&lt;/P&gt;
&lt;P&gt;First rule matches source and destination will be taken into account.&lt;/P&gt;
&lt;P&gt;If in first rule you allow HR department to visit social networking sites with security profile but at the same time block streaming media in the same URL filtering profile then person in HR group can never go to youtube (even if same person is also in streaming media group and you allow streaming media with next rule below).&lt;/P&gt;
&lt;P&gt;Rules are not mixed together - only one rule will be taken into account.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 11:49:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66710#M39293</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2015-10-16T11:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 6.1.4 Policy and URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66711#M39294</link>
      <description>&lt;P&gt;By the way "log at session start" should be used only for troubleshooting purpouses.&lt;/P&gt;
&lt;P&gt;It generates a lot more log (every application shift) so your log will fill up faster and you can't go back as long as you could with less logging.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 11:53:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66711#M39294</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2015-10-16T11:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: PA-500 6.1.4 Policy and URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66715#M39298</link>
      <description>&lt;P&gt;The firewall is a security tool. &amp;nbsp;We should be first asking what's important...What's critical to have. &amp;nbsp;It's annoying that everytime I'm on a TAC call I usually get the "you really shouldn't log on session start" comment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem with not logging on session start is you're only notified when the session has ended (obvious.) &amp;nbsp;The problem with saying "only use it for troubleshooting" is how do you troubleshoot something in the past?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Say for instance an FTP session, that session could be open for minutes, hours, or even days. &amp;nbsp;You'd never be notified about that traffic until the session was closed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Every one of my rules logs session start. &amp;nbsp;Over 20k user network and we generate about 3 million logs a day. &amp;nbsp;Our Panorama has 2TB of storage and we just shy of 2 months of on box retention.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 12:53:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-500-6-1-4-policy-and-url-filtering/m-p/66715#M39298</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-10-16T12:53:17Z</dc:date>
    </item>
  </channel>
</rss>

