<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking/Alerting on Web Sessions to IP Address Formatted URLs in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/150693#M50000</link>
    <description>&lt;P&gt;sorry if I was confusing, bottom line is I _don't_ think it will work because of the 7 character non-regex minimum.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you can try something even as basic as .*[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+.* which won't do any IP validation (but arguably &lt;A href="http://999.9999.999.999" target="_blank"&gt;http://999.9999.999.999&lt;/A&gt; wouldn't work anyway), but you'll get the 7 byte error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is from the tech doc:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;1. Every pattern you create must contain at least a 7-byte string with fixed values.
o The 7-byte fixed string can be anywhere in your pattern.
o The 7 values must be fixed, this means no ‘.’ (dot), no ‘*’ (star), no ‘+’ (plus), or other wildcard characters within the 7 bytes.&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 01 Apr 2017 15:17:40 GMT</pubDate>
    <dc:creator>bradk14</dc:creator>
    <dc:date>2017-04-01T15:17:40Z</dc:date>
    <item>
      <title>Blocking/Alerting on Web Sessions to IP Address Formatted URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/150668#M49996</link>
      <description>&lt;P&gt;One of my customers has asked if it is possible to block and/or alert upon HTTP or HTTPS connections that are made directly to an IP address instead of a dns name. &amp;nbsp;The specific IP addresses or DNS name is not defined, they would just like to alert upon this behavior any time it is seen since some malware can be hard-coded with IP addresses and users can potentially use this to bypass URL filtering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I opened a case with support&amp;nbsp;and was told this is not supported but I wanted to double check, as I vaguely remember this being discussed in a previous training that I attended.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Assuming no encryption has been applied to simplify the use case, is there any way to block or alert upon such behavior? &amp;nbsp;Can a Regex string be used to match the URI in an HTTP header or something of the sort? &amp;nbsp;Or is this not possible with Palo Alto firewalls?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 21:43:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/150668#M49996</guid>
      <dc:creator>TSilverline</dc:creator>
      <dc:date>2017-03-31T21:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking/Alerting on Web Sessions to IP Address Formatted URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/150684#M49998</link>
      <description>&lt;P&gt;in theory, your plan should work. however there are several caveats, the main one being that when it comes to creating a custom threat object, PA requires a minimum of 7 bytes/characters that are fixed, presumably to minimize the potential of false positives.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't see any method of detecting the traffic where you have the required minimum of known characters.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;beyond that, there are additional caveats such as that you won't see any it on HTTPS traffic unless you have SSL decryption.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also feel like while every little bit helps, it may lead into a sense of false security. most malware AFAIK does in fact use domain names, often they are even 'dynamically' generated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My advice would be to opt instead for the use of EDL/DBL lists and credible threat intelligence feeds and security policies to block them. Many feeds will provide IP based lists in addition to domains, although blocking IPs vs domains has its own caveats to be considered.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Apr 2017 12:21:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/150684#M49998</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-01T12:21:20Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking/Alerting on Web Sessions to IP Address Formatted URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/150692#M49999</link>
      <description>&lt;P&gt;Thanks for the input.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am a little confused on how you think it will work if PA requires a minimum of 7 characters that are fixed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried creating a custom signature to match the regex expression&amp;nbsp;&lt;SPAN class="regexspecial"&gt;\b&lt;/SPAN&gt;&lt;SPAN class="regexspecial"&gt;\d&lt;/SPAN&gt;&lt;SPAN class="regexspecial"&gt;{1,3}&lt;/SPAN&gt;&lt;SPAN class="regexescaped"&gt;\.&lt;/SPAN&gt;&lt;SPAN class="regexspecial"&gt;\d&lt;/SPAN&gt;&lt;SPAN class="regexspecial"&gt;{1,3}&lt;/SPAN&gt;&lt;SPAN class="regexescaped"&gt;\.&lt;/SPAN&gt;&lt;SPAN class="regexspecial"&gt;\d&lt;/SPAN&gt;&lt;SPAN class="regexspecial"&gt;{1,3}&lt;/SPAN&gt;&lt;SPAN class="regexescaped"&gt;\.&lt;/SPAN&gt;&lt;SPAN class="regexspecial"&gt;\d&lt;/SPAN&gt;&lt;SPAN class="regexspecial"&gt;{1,3}&lt;/SPAN&gt;&lt;SPAN class="regexspecial"&gt;\b but it keeps telling me pattern invalid no matter how I try to enter it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="regexspecial"&gt;I guess this is due to the restriction you mention above, but there is no indication in the alert saying what is wrong. &amp;nbsp;Can you confirm this is the case?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="regexspecial"&gt;I do understand this is probably not the best way to block traffic to prevent threats, but I can also appreciate the customer's desire to be alerted upon this slightly suspicious behavior.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Apr 2017 15:03:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/150692#M49999</guid>
      <dc:creator>TSilverline</dc:creator>
      <dc:date>2017-04-01T15:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking/Alerting on Web Sessions to IP Address Formatted URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/150693#M50000</link>
      <description>&lt;P&gt;sorry if I was confusing, bottom line is I _don't_ think it will work because of the 7 character non-regex minimum.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you can try something even as basic as .*[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+.* which won't do any IP validation (but arguably &lt;A href="http://999.9999.999.999" target="_blank"&gt;http://999.9999.999.999&lt;/A&gt; wouldn't work anyway), but you'll get the 7 byte error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is from the tech doc:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;1. Every pattern you create must contain at least a 7-byte string with fixed values.
o The 7-byte fixed string can be anywhere in your pattern.
o The 7 values must be fixed, this means no ‘.’ (dot), no ‘*’ (star), no ‘+’ (plus), or other wildcard characters within the 7 bytes.&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Apr 2017 15:17:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/150693#M50000</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-01T15:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking/Alerting on Web Sessions to IP Address Formatted URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/150980#M50052</link>
      <description>&lt;P&gt;One last question ... could the http:// count as the seven fixed characters?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried this but still receive pattern is invalid.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 04:19:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/150980#M50052</guid>
      <dc:creator>TSilverline</dc:creator>
      <dc:date>2017-04-04T04:19:59Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking/Alerting on Web Sessions to IP Address Formatted URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/151062#M50068</link>
      <description>&lt;P&gt;it depends on which field you are looking at. the URI request which is what I probably would have used in this case is the GET (or POST) line. it wouldn't have http in it. I'm not even sure if the traffic itself would ever actually even have http in it. http:// specifies the protocol to be used, but the actual transmission (e.g. the headers) don't mention http.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in any case, I would start really simple as I mentioned earlier. PA seems to be ultrasensitive about its regex patterns.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm still not very hopeful for you in this case, to be honest. even if it does work, I think blocking all IPs is a bad idea and alert is would be fine, but obviously not as effective. the EDL's are pretty much mandatory IMO. PAN-OS 8.0 even comes with a couple of malicious EDL's pre-defined.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 14:15:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/151062#M50068</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-04T14:15:43Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking/Alerting on Web Sessions to IP Address Formatted URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/151808#M50248</link>
      <description>&lt;P&gt;I see you mention "alert is would be fine."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there some other method you know of to alert on the behavior? &amp;nbsp;I agree that blocking is not ideal, but still searching for a way to alert. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN support is still pending respose to me on this matter as well.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Apr 2017 08:14:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/151808#M50248</guid>
      <dc:creator>TSilverline</dc:creator>
      <dc:date>2017-04-08T08:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking/Alerting on Web Sessions to IP Address Formatted URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/151811#M50250</link>
      <description>&lt;P&gt;I only meant alert would be fine in the sense that you aren't blocking anything. I think the potential for false positives is too great.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But no, other than what I've suggested by using threat intel feeds and/or custom DBL/EDLs to block known bads, I don't have any ideas for you that might work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You should also probably take advantage of the built-in Botnet report&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/71/pan-os/web-interface-help/monitor/monitor-botnet" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/71/pan-os/web-interface-help/monitor/monitor-botnet&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as that will flag traffic of interest to you (users browsing to IP addresses vs fqdn), but that's after the fact, of course.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Apr 2017 19:11:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/151811#M50250</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-08T19:11:34Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking/Alerting on Web Sessions to IP Address Formatted URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/151928#M50268</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/50790"&gt;@TSilverline&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;You might want to see how well creating a rule with the URL Category 'unknown' set to alert would work. All of the direct IPs are going to be flagged as category unknown and&amp;nbsp;&lt;EM&gt;most&lt;/EM&gt; websites resolve to a URL category if they have an actual URL. This would provile you with an alert for browsing directly to an IP address, but it might get you unwanted alerts for URLs that are simply not categorized as well.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2017 15:12:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/151928#M50268</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-04-10T15:12:39Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking/Alerting on Web Sessions to IP Address Formatted URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/151945#M50273</link>
      <description>&lt;P&gt;Thanks for the suggestions guys.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/58582"&gt;@bradk14&lt;/a&gt;: This was actually what I remembered from my training that I mentioned in my OP. &amp;nbsp;Thank you for pointing this out as I now have less of a feeling like I am not providing the customer the best response. &amp;nbsp;At least with the botnet report, there is a method of alerting on IP address browsing within the reports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;: &amp;nbsp;This makes sense but yah I can see the potential for false positives being very large. &amp;nbsp;Will have to do some reporting analysis on their environment to see how often they are detecting such behavior today.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2017 15:40:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-alerting-on-web-sessions-to-ip-address-formatted-urls/m-p/151945#M50273</guid>
      <dc:creator>TSilverline</dc:creator>
      <dc:date>2017-04-10T15:40:09Z</dc:date>
    </item>
  </channel>
</rss>

