<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic EBL Issues in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88127#M43478</link>
    <description>&lt;P&gt;I've just started to test working with an EBL to quickly update a block list without having to apply the URL Filter to all of the different groups that we have. I've verified that I have connection to the document and that the Palo Alto sees it but I can't actually get it to stop showing traffic, instead the HTTP Request Brute Force Attack reset picks it up instead of the rule that I have the EBL on.&lt;/P&gt;
&lt;P&gt;Currently the output looks like the following:&lt;/P&gt;
&lt;P&gt;Next update at: Thu Jun 16 15:00:31 2016&lt;BR /&gt; IPs:&lt;BR /&gt; 184.24.76.74&lt;BR /&gt; 104.66.34.213&lt;BR /&gt; 23.197.186.129&lt;BR /&gt; 173.241.244.220&lt;BR /&gt; 104.95.37.162&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Rule is near the top of the list, set to universal on the outside zone with the EBL list set as the source address to any destination, any service, any applicaiton, and the action is to block it and log at end. The issue is I'm seeing in the alerts is that it's identified as Rule 644 which is a catch all allowing traffic on HTTP and HTTPS instead of being blocked by the EBL. Is there something wrong with the way that I've inputed the IPs?&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jun 2016 19:58:47 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2016-06-16T19:58:47Z</dc:date>
    <item>
      <title>EBL Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88127#M43478</link>
      <description>&lt;P&gt;I've just started to test working with an EBL to quickly update a block list without having to apply the URL Filter to all of the different groups that we have. I've verified that I have connection to the document and that the Palo Alto sees it but I can't actually get it to stop showing traffic, instead the HTTP Request Brute Force Attack reset picks it up instead of the rule that I have the EBL on.&lt;/P&gt;
&lt;P&gt;Currently the output looks like the following:&lt;/P&gt;
&lt;P&gt;Next update at: Thu Jun 16 15:00:31 2016&lt;BR /&gt; IPs:&lt;BR /&gt; 184.24.76.74&lt;BR /&gt; 104.66.34.213&lt;BR /&gt; 23.197.186.129&lt;BR /&gt; 173.241.244.220&lt;BR /&gt; 104.95.37.162&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Rule is near the top of the list, set to universal on the outside zone with the EBL list set as the source address to any destination, any service, any applicaiton, and the action is to block it and log at end. The issue is I'm seeing in the alerts is that it's identified as Rule 644 which is a catch all allowing traffic on HTTP and HTTPS instead of being blocked by the EBL. Is there something wrong with the way that I've inputed the IPs?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 19:58:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88127#M43478</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-06-16T19:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: EBL Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88136#M43479</link>
      <description>&lt;P&gt;Are you able to see the list of IP address in the cli when you run the command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;request system external-list show type ip name &amp;lt;Name of ELB&amp;gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 20:09:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88136#M43479</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-06-16T20:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: EBL Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88137#M43480</link>
      <description>&lt;P&gt;Yes, that's actually where I pulled it for the original post.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 20:10:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88137#M43480</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-06-16T20:10:15Z</dc:date>
    </item>
    <item>
      <title>Re: EBL Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88144#M43481</link>
      <description>&lt;P&gt;could you share the screenshot of the policy that you have configured? and you are blocking traffic going to EBL ip or coming to EBL ip?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 20:11:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88144#M43481</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-06-16T20:11:45Z</dc:date>
    </item>
    <item>
      <title>Re: EBL Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88153#M43483</link>
      <description>&lt;P&gt;Here you go.&amp;nbsp; I'm trying to block the traffic coming from the EBL IP list; I'm starting to question if I don't need to set the destination as the EBL IP. When I look at the alert however it shows the source as one of the EBL IPs coming into the inside (Trust) interface, so I'm fairly certain that this should function perfectly fine.&lt;/P&gt;
&lt;P&gt;&lt;A href="http://textuploader.com/5b84q/raw" target="_blank"&gt;http://textuploader.com/5b84q/raw&lt;/A&gt; : This is the link to the test EBL that I made, from what I could see in Palo Alto guides to working with the EBL the fact that I left out the /32 shouldnt' be causing issues but I'm not 100% positive on that. &lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="EBL.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4435i54A1DDEFB3697D3C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="EBL.PNG" alt="EBL.PNG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 20:19:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88153#M43483</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-06-16T20:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: EBL Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88188#M43486</link>
      <description>&lt;P&gt;Could you show the logs that should hit this rule but is not hitting.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please attached the detailed log view.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 20:58:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88188#M43486</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-06-16T20:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: EBL Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88190#M43488</link>
      <description>&lt;P&gt;Hopefully this is what you were looking for.&lt;/P&gt;
&lt;P&gt;domain: 1&lt;BR /&gt; receive_time: 2016/06/16 14:39:46&lt;BR /&gt; serial: 001801005401&lt;BR /&gt; seqno: 34507671&lt;BR /&gt; actionflags: 0x0&lt;BR /&gt; type: THREAT&lt;BR /&gt; subtype: vulnerability&lt;BR /&gt; config_ver: 1&lt;BR /&gt; time_generated: 2016/06/16 14:39:46&lt;BR /&gt; src: 184.24.76.74&lt;BR /&gt; dst: 10.191.44.21&lt;BR /&gt; natsrc: 184.24.76.74&lt;BR /&gt; natdst: &lt;BR /&gt; rule: Rule 644&lt;BR /&gt; srcuser: &lt;BR /&gt; dstuser: \jallison&lt;BR /&gt; srcloc: US&lt;BR /&gt; dstloc: 10.0.0.0-10.255.255.255&lt;BR /&gt; app: soap&lt;BR /&gt; vsys: vsys1&lt;BR /&gt; from: outside&lt;BR /&gt; to: inside&lt;BR /&gt; inbound_if: ethernet1/2&lt;BR /&gt; outbound_if: ethernet1/1&lt;BR /&gt; logset: Solarwinds-Email&lt;BR /&gt; time_received: 2016/06/16 14:39:46&lt;BR /&gt; sessionid: 51703&lt;BR /&gt; repeatcnt: 10&lt;BR /&gt; sport: 80&lt;BR /&gt; dport: 63177&lt;BR /&gt; natsport: 80&lt;BR /&gt; natdport: 13041&lt;BR /&gt; flags: 0x400000&lt;BR /&gt; proto: tcp&lt;BR /&gt; action: reset-both&lt;BR /&gt; cpadding: 0&lt;BR /&gt; dg_hier_level_1: 0&lt;BR /&gt; dg_hier_level_2: 0&lt;BR /&gt; dg_hier_level_3: 0&lt;BR /&gt; dg_hier_level_4: 0&lt;BR /&gt; vsys_name: &lt;BR /&gt; device_name: LegFPA1&lt;BR /&gt; vsys_id: 1&lt;BR /&gt; threatid: HTTP Request Brute Force Attack(40059)&lt;BR /&gt; reportid: 0&lt;BR /&gt; category: computer-and-internet-info&lt;BR /&gt; contenttype: &lt;BR /&gt; severity: high&lt;BR /&gt; direction: server-to-client&lt;BR /&gt; url_idx: 1&lt;BR /&gt; padding: 0&lt;BR /&gt; pcap_id: 0&lt;BR /&gt; filedigest: &lt;BR /&gt; user_agent: &lt;BR /&gt; filetype: &lt;BR /&gt; misc: &lt;BR /&gt; cloud: &lt;BR /&gt; xff: &lt;BR /&gt; referer: &lt;BR /&gt; sender: &lt;BR /&gt; subject: &lt;BR /&gt; recipient: &lt;BR /&gt; file_url:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 21:06:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88190#M43488</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-06-16T21:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: EBL Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88288#M43490</link>
      <description>&lt;P&gt;This should work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try one more this clone the EBL policy put it on top or the EBL rule and instead of EBL address object put IP and test. So that we can confirm if it is the issue with EBL or something else&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 00:00:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88288#M43490</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-06-17T00:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: EBL Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88575#M43497</link>
      <description>&lt;P&gt;With the IP instead of the EBL object the rule functions as it should. I also tried creating a rule specifically saying that our inside network can't go to the EBL as the destination and that appears to function fine.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 13:00:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88575#M43497</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-06-17T13:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: EBL Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88798#M43511</link>
      <description>&lt;P&gt;May be the text file have some issue or it may be the issue with the firewall. Try creating a new txt file and check if not then please open a case with support.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 18:54:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88798#M43511</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-06-17T18:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: EBL Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88889#M43512</link>
      <description>&lt;P&gt;How are you testing this rule? From which side/IP the traffic is initiated?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the Threat traffic log shows it as server-to-client flow and src: &lt;SPAN&gt;184.24.76.74 &amp;amp; dst:&amp;nbsp;10.191.44.21&lt;/SPAN&gt;&amp;nbsp;then my guess traffic is inititated from 10.191.44.21 to 184.24.76.74, that way this EBL policy will not match. If traffic/session would be initiated from the 184.x.x.x, that the source address would matter when traffic hits Palo Alto (unless something is different for Dynamic Lists as I have not used them). But when you said using simple IP without EBL worked fine, that made me question my assumptions, but still sharing&amp;nbsp;them with you.&lt;/P&gt;
&lt;P&gt;Anyway you can try testing if the policy matches through CLI&amp;nbsp;&lt;EM&gt;#test security-policy-match ... a&lt;/EM&gt;nd try taking a look at &lt;EM&gt;#show running security-policy&lt;/EM&gt; if there are EBL addresses seen within the rule. Additionally check session information by &lt;EM&gt;#show session id&lt;/EM&gt; for that particular session.&lt;/P&gt;
&lt;P&gt;What PANOS version are you running on?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 19:56:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/88889#M43512</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2016-06-17T19:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: EBL Issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/89598#M43544</link>
      <description>&lt;P&gt;Once I applied the rule with the EBL as the destination instead of the source then it stated working as it should.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2016 12:55:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ebl-issues/m-p/89598#M43544</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-06-20T12:55:00Z</dc:date>
    </item>
  </channel>
</rss>

