<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking lists of IPs in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-lists-of-ips/m-p/7699#M5692</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can partially automate this with a small bash script that reads the ZeuS IP blocklist and creates the CLI commands to modify the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#!/bin/bash&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;seq=1&lt;/P&gt;&lt;P&gt;today=$(date +%m/%d/%Y)&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;echo "set cli scripting-mode on"&lt;/P&gt;&lt;P&gt;echo "configure"&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;description="zeus $today"&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;for ip in $(egrep '^[1-9]' zeus.txt); do&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name="zeus_${seq}"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo "set address $name description \"$description\" ip-netmask $ip"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo "set address-group bad_guys [ $name ]"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; seq=$(($seq + 1))&lt;/P&gt;&lt;P&gt;done&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;echo " "&lt;/P&gt;&lt;P&gt;echo "commit"&lt;/P&gt;&lt;P&gt;echo "save config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With a shortened zeus file, the output is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set cli scripting-mode on&lt;/P&gt;&lt;P&gt;configure&lt;/P&gt;&lt;P&gt;set address zeus_1 description "zeus 08/28/2012" ip-netmask 103.11.74.6&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_1 ]&lt;/P&gt;&lt;P&gt;set address zeus_2 description "zeus 08/28/2012" ip-netmask 108.163.232.202&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_2 ]&lt;/P&gt;&lt;P&gt;set address zeus_3 description "zeus 08/28/2012" ip-netmask 108.163.247.74&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_3 ]&lt;/P&gt;&lt;P&gt;set address zeus_4 description "zeus 08/28/2012" ip-netmask 109.127.8.242&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_4 ]&lt;/P&gt;&lt;P&gt;set address zeus_5 description "zeus 08/28/2012" ip-netmask 109.127.8.246&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_5 ]&lt;/P&gt;&lt;P&gt;set address zeus_6 description "zeus 08/28/2012" ip-netmask 109.169.58.188&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_6 ]&lt;/P&gt;&lt;P&gt;set address zeus_7 description "zeus 08/28/2012" ip-netmask 109.202.98.26&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_7 ]&lt;/P&gt;&lt;P&gt;commit&lt;/P&gt;&lt;P&gt;save config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manually enter "set cli scripting-mode on" so that you can easily cut-n-paste the script output into the PA command line.&amp;nbsp; Then, cut-n-paste the everything but the commit and save commands.&amp;nbsp; If you do not get errors, perform the commit and save.&amp;nbsp; This does require the presence of existing security policies that block traffic to and from the group bad_guys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This can be further automated using Expect or the API once you are confident things are working.&amp;nbsp; Note there is (or was) a limit of 500 objects in a group.&amp;nbsp; But, you can use groups of groups to get around that.&amp;nbsp; The scripting does get more complex.&amp;nbsp; At that point, a better scripting language is in order.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Aug 2012 20:11:07 GMT</pubDate>
    <dc:creator>holmesw</dc:creator>
    <dc:date>2012-08-28T20:11:07Z</dc:date>
    <item>
      <title>Blocking lists of IPs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-lists-of-ips/m-p/7698#M5691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'd like to block a list of IP addresses based on the ZeuS IP Blocklist.&amp;nbsp; What is the best/preferred method for doing this on the Palo Alto?&amp;nbsp; Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 13:51:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-lists-of-ips/m-p/7698#M5691</guid>
      <dc:creator>sconley</dc:creator>
      <dc:date>2012-08-28T13:51:47Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking lists of IPs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-lists-of-ips/m-p/7699#M5692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can partially automate this with a small bash script that reads the ZeuS IP blocklist and creates the CLI commands to modify the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#!/bin/bash&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;seq=1&lt;/P&gt;&lt;P&gt;today=$(date +%m/%d/%Y)&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;echo "set cli scripting-mode on"&lt;/P&gt;&lt;P&gt;echo "configure"&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;description="zeus $today"&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;for ip in $(egrep '^[1-9]' zeus.txt); do&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name="zeus_${seq}"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo "set address $name description \"$description\" ip-netmask $ip"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo "set address-group bad_guys [ $name ]"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; seq=$(($seq + 1))&lt;/P&gt;&lt;P&gt;done&lt;/P&gt;&lt;P&gt;#&lt;/P&gt;&lt;P&gt;echo " "&lt;/P&gt;&lt;P&gt;echo "commit"&lt;/P&gt;&lt;P&gt;echo "save config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With a shortened zeus file, the output is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set cli scripting-mode on&lt;/P&gt;&lt;P&gt;configure&lt;/P&gt;&lt;P&gt;set address zeus_1 description "zeus 08/28/2012" ip-netmask 103.11.74.6&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_1 ]&lt;/P&gt;&lt;P&gt;set address zeus_2 description "zeus 08/28/2012" ip-netmask 108.163.232.202&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_2 ]&lt;/P&gt;&lt;P&gt;set address zeus_3 description "zeus 08/28/2012" ip-netmask 108.163.247.74&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_3 ]&lt;/P&gt;&lt;P&gt;set address zeus_4 description "zeus 08/28/2012" ip-netmask 109.127.8.242&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_4 ]&lt;/P&gt;&lt;P&gt;set address zeus_5 description "zeus 08/28/2012" ip-netmask 109.127.8.246&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_5 ]&lt;/P&gt;&lt;P&gt;set address zeus_6 description "zeus 08/28/2012" ip-netmask 109.169.58.188&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_6 ]&lt;/P&gt;&lt;P&gt;set address zeus_7 description "zeus 08/28/2012" ip-netmask 109.202.98.26&lt;/P&gt;&lt;P&gt;set address-group bad_guys [ zeus_7 ]&lt;/P&gt;&lt;P&gt;commit&lt;/P&gt;&lt;P&gt;save config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manually enter "set cli scripting-mode on" so that you can easily cut-n-paste the script output into the PA command line.&amp;nbsp; Then, cut-n-paste the everything but the commit and save commands.&amp;nbsp; If you do not get errors, perform the commit and save.&amp;nbsp; This does require the presence of existing security policies that block traffic to and from the group bad_guys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This can be further automated using Expect or the API once you are confident things are working.&amp;nbsp; Note there is (or was) a limit of 500 objects in a group.&amp;nbsp; But, you can use groups of groups to get around that.&amp;nbsp; The scripting does get more complex.&amp;nbsp; At that point, a better scripting language is in order.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 20:11:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-lists-of-ips/m-p/7699#M5692</guid>
      <dc:creator>holmesw</dc:creator>
      <dc:date>2012-08-28T20:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking lists of IPs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-lists-of-ips/m-p/7700#M5693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PAN-OS 5.0 has a new feature called "Dynamic Block Lists". We have not yet tested the functionality but it looks like the answer to your need. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2013 17:33:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-lists-of-ips/m-p/7700#M5693</guid>
      <dc:creator>yesitisme_007</dc:creator>
      <dc:date>2013-02-19T17:33:37Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking lists of IPs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-lists-of-ips/m-p/7701#M5694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are some details on dynamic Block list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="T_Text" style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 10pt; margin-bottom: 3pt;"&gt;&lt;A name="1607392"&gt;Use the &lt;/A&gt;&lt;SPAN style="font-weight: bold;"&gt;Dynamic Block Lists&lt;/SPAN&gt; page to create an address object based on an imported list of IP addresses. The source of the list must be a text file and must be located on a web server. You can set the &lt;SPAN style="font-weight: bold;"&gt;Repeat&lt;/SPAN&gt; option to automatically update the list on the device hourly, daily, weekly, or monthly. After creating a dynamic block list object, you can then use the address object in the source and destination fields for security policies. Each&lt;SPAN style="font-size: 11pt;"&gt; &lt;/SPAN&gt;imported list can contain up to 5,000 IP addresses (IPv4 and/or IPv6), IP ranges, or subnets.&lt;/P&gt;&lt;P class="T_Text" style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 10pt; margin-bottom: 3pt;"&gt;&lt;A name="1607393"&gt;The list must contain one IP address, range, or subnet per line, for example:&lt;/A&gt;&lt;/P&gt;&lt;P class="TB_TableBody" style="color: #000000; font-family: Palatino; font-size: 10pt; margin-bottom: 3pt;"&gt;&lt;SPAN style="font-family: 'Microsoft Sans Serif'; font-size: 10pt;"&gt;“192.168.80.150/32” indicates one address, and “192.168.80.0/24” indicates all addresses from 192.168.80.0 through 192.168.80.255.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="TB_TableBody" style="color: #000000; font-family: Palatino; font-size: 10pt; margin-bottom: 3pt;"&gt;&lt;SPAN style="font-family: 'Microsoft Sans Serif'; font-size: 10pt;"&gt;Example:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="TB_TableBody" style="color: #000000; font-family: Palatino; font-size: 10pt; margin-bottom: 3pt;"&gt;&lt;SPAN style="font-family: 'Microsoft Sans Serif'; font-size: 10pt;"&gt;“2001:db8:123:1::1” or “2001:db8:123:1::/64”&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="TB_TableBody" style="color: #000000; font-family: Palatino; font-size: 10pt; font-weight: bold; margin-bottom: 3pt;"&gt;&lt;SPAN style="font-family: 'Microsoft Sans Serif'; font-size: 10pt;"&gt;IP Range:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="TB_TableBody" style="color: #000000; font-family: Palatino; font-size: 10pt; margin-bottom: 3pt;"&gt;&lt;SPAN style="font-family: 'Microsoft Sans Serif'; font-size: 10pt;"&gt;To specify an address range, select &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold;"&gt;IP Range&lt;/SPAN&gt;, and enter a range of addresses. The format is:&lt;/P&gt;&lt;P class="TB_TableBody" style="color: #000000; font-family: Palatino; font-size: 10pt; margin-bottom: 3pt;"&gt;&lt;SPAN style="font-style: italic;"&gt;ip_address&lt;/SPAN&gt;–&lt;SPAN style="font-style: italic;"&gt;ip_address&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="TB_TableBody" style="color: #000000; font-family: Palatino; font-size: 10pt; margin-bottom: 3pt;"&gt;&lt;SPAN style="font-family: 'Microsoft Sans Serif'; font-size: 10pt;"&gt;where each address can be IPv4 or IPv6.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="TB_TableBody" style="color: #000000; font-family: Palatino; font-size: 10pt; margin-bottom: 3pt;"&gt;&lt;SPAN style="font-family: 'Microsoft Sans Serif'; font-size: 10pt;"&gt;Example:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="TB_TableBody" style="color: #000000; font-family: Palatino; font-size: 10pt; margin-bottom: 3pt;"&gt;&lt;SPAN style="font-family: 'Microsoft Sans Serif'; font-size: 10pt;"&gt;“2001:db8:123:1::1 - 2001:db8:123:1::22”&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="T_Text" style="color: #000000; font-family: Palatino; font-size: 12pt; margin-bottom: 3pt;"&gt;&lt;A name="1626908"&gt; &lt;/A&gt;&lt;/P&gt;&lt;TABLE cellspacing="0" class="TW_TableWide" style="margin-bottom: 20pt; margin-top: 10pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt; color: #000000; font-family: 'Times New Roman'; font-size: medium;" summary=""&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.5pt; border-top-color: #000000; border-top-style: solid; border-top-width: 2pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TH_TableHeading" style="font-family: 'Tw Cen MT'; font-size: 11pt; font-weight: bold; text-indent: 0pt;"&gt;&lt;A name="1606366"&gt;Field&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.5pt; border-top-color: #000000; border-top-style: solid; border-top-width: 2pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TH_TableHeading" style="font-family: 'Tw Cen MT'; font-size: 11pt; font-weight: bold; text-indent: 0pt;"&gt;&lt;A name="1606368"&gt;Description&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.25pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.5pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TSH_TableSubHeading" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt; text-indent: 0pt;"&gt;&lt;A name="1606370"&gt;Name&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.25pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.5pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TB_TableBody" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt; margin-bottom: 3pt; text-indent: 0pt;"&gt;&lt;A name="1606372"&gt;Enter a name to identify the Dynamic Block List (up to 32 characters). This name will appear when selecting the source or destination in a policy.&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.25pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.25pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TSH_TableSubHeading" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt; text-indent: 0pt;"&gt;&lt;A name="1606374"&gt;Description&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.25pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.25pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TB_TableBody" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt; margin-bottom: 3pt; text-indent: 0pt;"&gt;&lt;A name="1606376"&gt;Enter a description for the block list (up to 255 characters).&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.25pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.25pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TSH_TableSubHeading" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt; text-indent: 0pt;"&gt;&lt;A name="1606378"&gt;Source&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.25pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.25pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TB_TableBody" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt; margin-bottom: 3pt; text-indent: 0pt;"&gt;&lt;A name="1606380"&gt;Enter an HTTP or HTTPS URL path that contains the text file. For example, http:\\1.1.1.1\myfile.txt. You can also enter a UNC server path.&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.25pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.25pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TSH_TableSubHeading" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt; text-indent: 0pt;"&gt;&lt;A name="1606382"&gt;Repeat&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.25pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.25pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TB_TableBody" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt; margin-bottom: 3pt; text-indent: 0pt;"&gt;&lt;A name="1606384"&gt;Specify the frequency in which the list should be imported. You can choose hourly, daily, weekly, or monthly. At the specified interval, the list will be imported into the configuration. A full commit is not needed for this type of update to occur.&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.5pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.25pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TSH_TableSubHeading" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt; text-indent: 0pt;"&gt;&lt;A name="1606386"&gt;Test Source URL&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-bottom-color: #000000; border-bottom-style: solid; border-bottom-width: 0.5pt; border-top-color: #000000; border-top-style: solid; border-top-width: 0.25pt; padding-bottom: 3pt; padding-left: 6pt; padding-right: 6pt; padding-top: 5pt;"&gt;&lt;P class="TB_TableBody" style="font-family: 'Microsoft Sans Serif'; font-size: 9pt; margin-bottom: 3pt; text-indent: 0pt;"&gt;&lt;A name="1606388"&gt;Test that the source URL or server path is available.&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2013 19:26:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-lists-of-ips/m-p/7701#M5694</guid>
      <dc:creator>mbutt</dc:creator>
      <dc:date>2013-02-19T19:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking lists of IPs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-lists-of-ips/m-p/7702#M5695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is another Link for Dynamic Block Lists and Spamhaus&lt;/P&gt;&lt;H1 style="margin-right: 100px; padding-left: 32px; font-size: 26px; font-family: Arial, Helvetica, sans-serif; color: #779308; background-color: #ffffff;"&gt;&lt;/H1&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-4146"&gt;https://live.paloaltonetworks.com/docs/DOC-4146&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Numan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2013 19:33:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-lists-of-ips/m-p/7702#M5695</guid>
      <dc:creator>mbutt</dc:creator>
      <dc:date>2013-02-19T19:33:06Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking lists of IPs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-lists-of-ips/m-p/7703#M5696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks everyone for the responses.&amp;nbsp; We've been actively using the dynamic block list feature since the 5.0 release (I guess I forgot to update this thread).&amp;nbsp; We've been working with support on 1 issue we've been seeing when using the Spamhaus list.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2013 12:51:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-lists-of-ips/m-p/7703#M5696</guid>
      <dc:creator>sconley</dc:creator>
      <dc:date>2013-02-21T12:51:17Z</dc:date>
    </item>
  </channel>
</rss>

