<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Data-Filtering ALLOW in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151471#M50156</link>
    <description>&lt;P&gt;Thank you all for the responses. I am coming to the sad conclusion that this is not possible with a straight-forward configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By the way, my application is that I want to filter the port-53 traffic headed from the outside-world to my DNS-servers and scan the payload for our domain-name. Any DNS lookup coming in from the outside that is NOT for our domain is necessarily bogus (by our definition) and probably a DoS attack and should be dropped. I realize that there are flood-checks that we can use, and we do that already, but I’d really like to add this extra layer. All I think that it would take is in the “Objects/Security Profiles/Data Filtering” page, to have an “Allow Threshold” in addition to the “Block Threshold”. Then (theoretically) I could write a “Deny” rule and use the Data Filtering profile as an “Allow” exception to that. Oh well. I suppose that a flavor of DNSSec might help too, but it would be nice to do this in the firewall.&lt;/P&gt;</description>
    <pubDate>Thu, 06 Apr 2017 14:27:07 GMT</pubDate>
    <dc:creator>JohnPa</dc:creator>
    <dc:date>2017-04-06T14:27:07Z</dc:date>
    <item>
      <title>Data-Filtering ALLOW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151247#M50108</link>
      <description>&lt;P&gt;I am using PAN-OS 7.1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have figured out how to use basic data-filtering to block traffic with certain patterns in the payload, but I want to do the opposite. I want to configure a rule that will only ALLOW packets with a certain pattern, and automatically drop everything else. Is there a way to do this?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 16:46:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151247#M50108</guid>
      <dc:creator>JohnPa</dc:creator>
      <dc:date>2017-04-05T16:46:18Z</dc:date>
    </item>
    <item>
      <title>Re: Data-Filtering ALLOW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151330#M50120</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Yes you should be able to do this. Just put the rules you want to allow at the begining of the policies and then either put a DENY ALL rule at the bottom or use the one built in. I prefer my own DENY ALL rule since its easier to see in the logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 23:02:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151330#M50120</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2017-04-05T23:02:07Z</dc:date>
    </item>
    <item>
      <title>Re: Data-Filtering ALLOW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151417#M50134</link>
      <description>&lt;P&gt;I'm not sure this is actually possible because you can't use the result of a data filtering profile as a factor of policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what may be possible is to create a custom app and to apply policy based on that. you would have to also allow a supporting policy/app (such as web-browsing and ssl) that would allow enough initial traffic through for the AppID to work, however.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the whole thing sounds a little ambitious to me though to be frank. that has to be a very specific/curious use case.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Apr 2017 09:04:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151417#M50134</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-06T09:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: Data-Filtering ALLOW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151421#M50137</link>
      <description>&lt;P&gt;you could use a negate on your sources to block 'everything except these sources' (or destination, whatever is more convenient)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="negate.png"&gt;&lt;img src="https://live.paloaltonetworks.com/skins/images/B81F31A7B44084F326ABA63EFCA50C9D/responsive_peak/images/image_not_found.png" alt="negate.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;::edit:: you'll need to figure a way to make your pattern into a custom application or custom threat (i misread your initial post)&lt;/P&gt;
&lt;P&gt;data filtering is one of the only exceptions to what i describe above as i can only be configured to 'add' weight rather than substract and you'll need to allow traffic prior to being able to block because of the weight exceeding your limit, so purely on datafiltering this is not possible&lt;/P&gt;</description>
      <pubDate>Thu, 06 Apr 2017 09:21:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151421#M50137</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-04-06T09:21:49Z</dc:date>
    </item>
    <item>
      <title>Re: Data-Filtering ALLOW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151471#M50156</link>
      <description>&lt;P&gt;Thank you all for the responses. I am coming to the sad conclusion that this is not possible with a straight-forward configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By the way, my application is that I want to filter the port-53 traffic headed from the outside-world to my DNS-servers and scan the payload for our domain-name. Any DNS lookup coming in from the outside that is NOT for our domain is necessarily bogus (by our definition) and probably a DoS attack and should be dropped. I realize that there are flood-checks that we can use, and we do that already, but I’d really like to add this extra layer. All I think that it would take is in the “Objects/Security Profiles/Data Filtering” page, to have an “Allow Threshold” in addition to the “Block Threshold”. Then (theoretically) I could write a “Deny” rule and use the Data Filtering profile as an “Allow” exception to that. Oh well. I suppose that a flavor of DNSSec might help too, but it would be nice to do this in the firewall.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Apr 2017 14:27:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151471#M50156</guid>
      <dc:creator>JohnPa</dc:creator>
      <dc:date>2017-04-06T14:27:07Z</dc:date>
    </item>
    <item>
      <title>Re: Data-Filtering ALLOW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151474#M50158</link>
      <description>&lt;P&gt;you could give custom app a go, since you are hitting on a string&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;create a rule to allow your custom app, then a second rule to drop all dns&lt;/P&gt;</description>
      <pubDate>Thu, 06 Apr 2017 14:31:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151474#M50158</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-04-06T14:31:25Z</dc:date>
    </item>
    <item>
      <title>Re: Data-Filtering ALLOW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151478#M50160</link>
      <description>&lt;P&gt;that is an interesting use case. I'll take your word for it that action is necessary.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you opt to explore a custom app. you can look at dns-req-section, see page page 19 of &lt;A href="https://live.paloaltonetworks.com/t5/Tech-Note-Articles/Creating-Custom-Application-and-Threat-Signatures/ta-p/58569" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Tech-Note-Articles/Creating-Custom-Application-and-Threat-Signatures/ta-p/58569&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I briefly had another idea involving a SIEM and an action that could result in blocking the IP, but I don't think you'll ever see the actual DNS request itself inside the logs.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Apr 2017 14:42:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-filtering-allow/m-p/151478#M50160</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-06T14:42:34Z</dc:date>
    </item>
  </channel>
</rss>

