<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block http traffic to numeric URLs in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/88797#M43510</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Websites accessed using the IP address end up in the "unknown" URL category, so you could just block that category. You will also block uncategorized URLs, but those are often malware sites anyway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Benjamin&lt;/P&gt;</description>
    <pubDate>Fri, 17 Jun 2016 18:49:34 GMT</pubDate>
    <dc:creator>BenjAudy.MTL</dc:creator>
    <dc:date>2016-06-17T18:49:34Z</dc:date>
    <item>
      <title>Block http traffic to numeric URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/88696#M43504</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was ordered to block all http and hhtps traffic to addresses without a dns name. In other words &lt;STRONG&gt;user&lt;/STRONG&gt; have to put in a network name in the browser and &lt;STRONG&gt;are not allowed to type an IP address in the address field.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As the thinking behind is blocking malware communication I have to block this traffic at the firewall and not at the browser. So I tried to setup a custom URL category with a site in the regexp form:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;([0-9])+([0-9])?([0-9])?\.([0-9])+([0-9])?([0-9])?\.([0-9])+([0-9])?([0-9])?\.([0-9])+([0-9])?([0-9])?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but this doesn't seem to work, although this was declared in the Data Patterns section of the online help ( ..PAN_help/en/wwhelp/wwhimpl/js/html/wwhelp.htm#href=security.05.5.html )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any smarter way to block access to numeric addresses without setting up more the 4 billion entries in a list?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank You in advance&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Peter&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 15:39:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/88696#M43504</guid>
      <dc:creator>adminatspace</dc:creator>
      <dc:date>2016-06-17T15:39:01Z</dc:date>
    </item>
    <item>
      <title>Re: Block http traffic to numeric URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/88713#M43506</link>
      <description>&lt;P&gt;We can try doing by creating custom vulnerability profile. Here in pattern we can specify regex&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="chrome_2016-06-17_09-16-40.png" style="width: 708px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4449i94760AFDE8D954D0/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="chrome_2016-06-17_09-16-40.png" alt="chrome_2016-06-17_09-16-40.png" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 16:16:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/88713#M43506</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-06-17T16:16:41Z</dc:date>
    </item>
    <item>
      <title>Re: Block http traffic to numeric URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/88730#M43509</link>
      <description>&lt;P&gt;Thank You for the fast answer, I will have to look at this in detail on beginning of next week. I will give feedback if i was successful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Peter&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 16:38:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/88730#M43509</guid>
      <dc:creator>adminatspace</dc:creator>
      <dc:date>2016-06-17T16:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: Block http traffic to numeric URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/88797#M43510</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Websites accessed using the IP address end up in the "unknown" URL category, so you could just block that category. You will also block uncategorized URLs, but those are often malware sites anyway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Benjamin&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 18:49:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/88797#M43510</guid>
      <dc:creator>BenjAudy.MTL</dc:creator>
      <dc:date>2016-06-17T18:49:34Z</dc:date>
    </item>
    <item>
      <title>Re: Block http traffic to numeric URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/90321#M43562</link>
      <description>&lt;P&gt;today I tried to set up a Custom Vulnerability Signature, like &lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20090" target="_self"&gt;&lt;SPAN&gt;pankaj.kumar&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;said, but I didn't succeed. I got the following error message:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="x-window-body"&gt;&lt;DIV&gt;&lt;DIV class="ext-mb-icon x-hidden"&gt;Operation failed&lt;/DIV&gt;&lt;DIV class="ext-mb-icon x-hidden"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="ext-mb-content"&gt;&lt;SPAN class="ext-mb-text"&gt;threats -&amp;gt; vulnerability -&amp;gt; 41000 -&amp;gt; signature -&amp;gt; standard -&amp;gt; RY_Numeric_IP_Sign -&amp;gt; and-condition -&amp;gt; And Condition 1 -&amp;gt; or-condition -&amp;gt; Or Condition 1 -&amp;gt; operator -&amp;gt; pattern-match -&amp;gt; pattern '([0-9])+([0-9])?([0-9])?\.([0-9])+([0-9])?([0-9])?​ \.([0-9])+([0-9])?([0-9])?\.([0-9])+([0-9])?([0-9]​)?' is invalid. pattern must be at least 7 bytes&lt;BR /&gt;threats -&amp;gt; vulnerability -&amp;gt; 41000 -&amp;gt; signature -&amp;gt; standard -&amp;gt; RY_Numeric_IP_Sign -&amp;gt; and-condition -&amp;gt; And Condition 1 -&amp;gt; or-condition -&amp;gt; Or Condition 1 -&amp;gt; operator -&amp;gt; pattern-match -&amp;gt; pattern is invalid&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="x-window-bwrap"&gt;&lt;DIV class="x-window-ml"&gt;&lt;DIV class="x-window-mr"&gt;&lt;DIV class="x-window-mc"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Clipboard03.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4490iAA320587516A9E22/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Clipboard03.jpg" alt="Clipboard03.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Clipboard02.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4491i6E83F0DEEED8FA33/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Clipboard02.jpg" alt="Clipboard02.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Clipboard01.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4492iBCC1C15AD08E17E7/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Clipboard01.jpg" alt="Clipboard01.jpg" /&gt;&lt;/span&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I will also take a look at the "unknown" category, but I'm a bit afraid this will give a lot false positives.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 09:17:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/90321#M43562</guid>
      <dc:creator>adminatspace</dc:creator>
      <dc:date>2016-06-21T09:17:01Z</dc:date>
    </item>
    <item>
      <title>Re: Block http traffic to numeric URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/90359#M43564</link>
      <description>&lt;P&gt;In regards to the 'unknown' blocking, it can create false positives but a lot of the time it is not work related traffic in our enviroment. We have implimented about a 75% block on 'unknown traffic by dropping 'unknown' url traffic to countries we do not typically do businesss with or where we feel it has been mostly malicious. Initially this left us with two countries which we are allowing 'unknown' url to. Howerver, we now have started to slowly block these countries by taking small internal ip blocks and monitoring this traffic looking for legit traffic (which somitimes is ip based urls) and recatergorizing or adding to a custom allow url profile. We have had a couple where users had to log a call to have us look at them but for the most part it has been a pretty smooth implementation other than being a bit slow.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 10:19:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/90359#M43564</guid>
      <dc:creator>clewis1</dc:creator>
      <dc:date>2016-06-21T10:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: Block http traffic to numeric URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/90397#M43568</link>
      <description>&lt;P&gt;We block unknowns also.&lt;/P&gt;&lt;P&gt;If some new business related site pops up and users need access now not in 3-5 days when Palo has picked it up from Passive DNS monitoring then I just add this new site to custom url category and send url recategorization request to Palo.&lt;/P&gt;&lt;P&gt;Usually in 24 hours site is categorized and I can remove exclusion from custom url category.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 12:13:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-http-traffic-to-numeric-urls/m-p/90397#M43568</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2016-06-21T12:13:35Z</dc:date>
    </item>
  </channel>
</rss>

