<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL Filtering with Multiple Exceptions in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-with-multiple-exceptions/m-p/138289#M47925</link>
    <description>&lt;P&gt;Yeah, it's hard to know what will be reocgnised as an application and what only as a web-browsing to a specific URL like you ecperienced with your 'gambling' testing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe both of your 2 options would work with some additional configuration. In rules where you are allowing web browsking and applying URL filtering options, set application to 'any' and limit service to port 80 and 443 (and maybe 8080). But also make an additional rule above these web browsing rules. In this rule block all unwanted application, preferably with application filters (gamin, remote access, file sharing...).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe it's not ideal solution but it should work. I'm also interested to hear how others are combining URL filtering and application policy for web browsking traffic.&lt;/P&gt;</description>
    <pubDate>Thu, 19 Jan 2017 07:43:03 GMT</pubDate>
    <dc:creator>santonic</dc:creator>
    <dc:date>2017-01-19T07:43:03Z</dc:date>
    <item>
      <title>URL Filtering with Multiple Exceptions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-with-multiple-exceptions/m-p/138258#M47923</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are currently looking to replace our old Bluecoat proxy with Palo Alto URL filtering but having some issues planning out a reliable and sustinable policy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the sake of simplicity, I'll outline a generic scenario and would appreciate some input on how to acheive this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scenario details:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All user will need internet access. By default all users will have access&amp;nbsp;to all URL categories EXCEPT for the&amp;nbsp;Adult, &amp;nbsp;Malware, Hacking, Gambling, Online-Storage and nudity categories. A URL Filtering policy called "Base URL Filtering Policy" is created, blocking these categories. All other categories are set to "Alert".&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some more information that may be relevant.&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;PAN-DB URL Filtering is being used&lt;/LI&gt;&lt;LI&gt;UserID is setup and working&lt;/LI&gt;&lt;LI&gt;SSL Decryption is NOT enabled and it is not practical to enable&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The default access security policy which will apply to anyone without any exceptions configured will be the last policy that could be matched. This will conisist of a security policy including:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Source Zone (Trusted)&lt;/LI&gt;&lt;LI&gt;User (Everyone)&lt;/LI&gt;&lt;LI&gt;Destination (Internet Zone)&lt;/LI&gt;&lt;LI&gt;Application: A list of permitted applications. (&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; I have found that if Applications is set to "any", the URL Filtering Profile on the policy isn't enough to stop other random traffic being allowed by this rule. - is this expected? Not sure of best approach here as I really don't want to have to effictivly whitelist every app) &amp;nbsp;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Service/URL Category: "Application default" and NO URL category specified&lt;/LI&gt;&lt;LI&gt;Actions: Allow, "Base URL Filtering Policy" Profile Specified in "Profile Settings".&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition to the standard level of access:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Users Alice, Bob and Charlie need access to the Hacking URL category&lt;/LI&gt;&lt;LI&gt;User&amp;nbsp;Dennis, Edison and Fiona need access to the Gambling category&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Users Greg and&amp;nbsp;Hannah need access to both Hacking and&amp;nbsp;Online Storage&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;How is this best acheived?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Two options come to mind:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Option 1:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I create 3 new Custom URL Filtering policies, allowing what is specified in the &lt;SPAN&gt;"Base URL Filtering Policy"&lt;/SPAN&gt;+ the additional categorie(s), and create 3 new security policies for these users? &amp;nbsp;My concern around this approach is:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;When we make changes to the default access level, we need to modify all these custom policies.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;As the security policy is only matched by "User", there will need to be a new URL profile and security policy created for every combination of access required. In our actual envrionment, these will get numerous. eg. If Fiona needs Online-Storage in addition to her current access, a 4th set of policy needs to be created for the combination of Gabling and Online Storage.&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Option 2:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition to "User", specify a URL Category to match in the "Service/URL Catrgory" section of the security policy.&lt;/P&gt;&lt;P&gt;This seems like the most ideal option. It would allow a single policy to be setup for each exception category, because it should only ever match the rule when the specified category matches. It would allow the same user to be specified on multiple exceptions, without creating a custom "combination" policy if required. &amp;nbsp;If nothing matches, the last rule applying the base policy for everyone is used. Sounds great, but...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have some concerns and questions about its use however.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;There is inconsistant information from PA documentation about its use: &lt;STRONG&gt;Example: 1)&lt;/STRONG&gt; &lt;A href="https://live.paloaltonetworks.com/t5/Learning-Articles/Security-policy-fundamentals/ta-p/53016#A8" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Learning-Articles/Security-policy-fundamentals/ta-p/53016#A8&lt;/A&gt; says you MUST allow the web-browsing application as part of the policy. This is not mentioned anywhere else &amp;nbsp;. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;STRONG&gt;Example 2)&lt;/STRONG&gt;&amp;nbsp; &lt;A href="https://www.paloaltonetworks.com/documentation/61/pan-os/pan-os/policy/components-of-a-security-policy-rule" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/61/pan-os/pan-os/policy/components-of-a-security-policy-rule&lt;/A&gt; says "To block or allow traffic based on URL category, you must apply a URL Filtering profile to the security policy rules. &lt;STRONG&gt;Define the URL Category as Any&lt;/STRONG&gt; and attach a URL Filtering profile to the security policy." &amp;nbsp;- this makes no sense, why would you set the URL Category as "Any" if you want to use it to match a rule in relation to URL filtering?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;This leavs me asking - should this be used at all? Should it be combined with a custom URL Filtering Profile which only allows the category specified in the Service/URL Category tab?&amp;nbsp;How should it be combined with applications? &amp;nbsp;&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My other concern around this stems from a result of some testing I conducted.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I setup a default browsing policy as described above, and create a new rule above it as described below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;"Allow Gambling" {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;profile-setting {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;profiles {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;url-filtering "Allow Gambling";&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;target {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;devices {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;000000000&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;negate no;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;to Internet;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;from Trust&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;source 192.168.204.2;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;destination any;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;source-user testuser;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;category gambling;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;application [ ssl web-browsing];&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;service application-default;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;hip-profiles any;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;action allow;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="terminal,monaco" size="1 2 3 4 5 6 7" color="#FF6600"&gt;}&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The URL Filtering Policy "Allow Gambling" specified above has the "gambling" category set to alert, all other categories deny.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Test 1:&lt;/STRONG&gt; Browse to gambling website &lt;A href="https://www.mrgreen.com" target="_blank"&gt;https://www.mrgreen.com&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt; Website opens fine. Traffic Logs show the traffic to the mrgreen.com web server matched the rule "Allow Gambling". URL filtering logs indicate the site was categorised as "gambling". Looks good!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Test 2:&amp;nbsp;&lt;/STRONG&gt;Browse to &lt;A href="https://www.bet365.com" target="_blank"&gt;https://www.bet365.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result:&amp;nbsp;&lt;/STRONG&gt;Website is blocked. T&lt;SPAN&gt;raffic Logs show the traffic to the bet365.com web server matched the rule "Allow Internet". HOWEVER the&amp;nbsp;URL filtering logs indicate the site was still categorised as "gambling". For some reason it did not match the "Allow Gambling" rule.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;--EDIT-------------------------------&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Further testing has shown that Bet365 was not matching because it was being identified as the Bet365 application, when the "Allow Gambling" policy only allowed web-browsing and ssl. This is reassuing, But does this mean I need to specify within the policy&amp;nbsp;every single application associated with the "gambling" URL category? As mentioned in the above article, "any" will not suffice, at least "web-browsing" needs to be defined in a policy where a URL Category is defined... ?&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;----------------------------------------&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In additon to the above, reviewing the traffic logs with a filter to show all log entries matching the rule "Allow Gambling" - there are hundreds of incomplete sessions to multiple destination IPs matching this rule, all showing &amp;nbsp;a "URL Category" of "any" and no associated URL Filtering log entry.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As a result of the above, I'm skeptical if this can provide a reliable approach to URL category exceptions to the default policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I understand I've covered a lot of different areas here and it might be difficlt to answer them all, but if anyone has time to have a look at this and share their experience or knowlegde in this area it'd be much appreciated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cheers&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 04:24:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-with-multiple-exceptions/m-p/138258#M47923</guid>
      <dc:creator>hophead84</dc:creator>
      <dc:date>2017-01-19T04:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering with Multiple Exceptions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-with-multiple-exceptions/m-p/138289#M47925</link>
      <description>&lt;P&gt;Yeah, it's hard to know what will be reocgnised as an application and what only as a web-browsing to a specific URL like you ecperienced with your 'gambling' testing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe both of your 2 options would work with some additional configuration. In rules where you are allowing web browsking and applying URL filtering options, set application to 'any' and limit service to port 80 and 443 (and maybe 8080). But also make an additional rule above these web browsing rules. In this rule block all unwanted application, preferably with application filters (gamin, remote access, file sharing...).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe it's not ideal solution but it should work. I'm also interested to hear how others are combining URL filtering and application policy for web browsking traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 07:43:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-with-multiple-exceptions/m-p/138289#M47925</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-01-19T07:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering with Multiple Exceptions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-with-multiple-exceptions/m-p/138460#M47962</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I've been through this a few times and the first thing we do is get management to agree to an acceptable level of exceptions/deviations from the 'Base/Everyone' policy. This way you can limit the number of polices that are required. However as you pointed out, there will be the need for 'Bob' to get to a specific category that someone else might not need to get to. In this case I have created special rules for either the category or the application that is detected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I.E.&amp;nbsp;&lt;A href="https://www.khanacademy.org/" target="_blank"&gt;https://www.khanacademy.org/&lt;/A&gt; is educational, however it requires a specific application other than web-browsing or ssl. So in this case I would either have to get managment to agree to allow everyone to be allowed to use the application or create a special rule to only allow certian AD users or groups access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes I agree this can get very tedious and mind bending at times, but I try and keep to the KISS principle and give management the two options and let them choose.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 23:51:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-with-multiple-exceptions/m-p/138460#M47962</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-01-19T23:51:42Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering with Multiple Exceptions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-with-multiple-exceptions/m-p/139254#M48083</link>
      <description>&lt;P&gt;Thanks for your input. I'm working through a solution now and will share my result once complete.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2017 03:32:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-with-multiple-exceptions/m-p/139254#M48083</guid>
      <dc:creator>hophead84</dc:creator>
      <dc:date>2017-01-25T03:32:07Z</dc:date>
    </item>
  </channel>
</rss>

