<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Creating a global, URL based whitelist rule in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213899#M62185</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83021"&gt;@JoeAndreini&lt;/a&gt;&amp;nbsp;this actually is another way to do what &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77394"&gt;@jessica-davis&lt;/a&gt;&amp;nbsp;already did. Here it depends on what you prefer. If you use the URL category directly in your security rule and not with an URL profile it is a filtering criteria, but because the firewall needs some packets to get to the http request/tls client hello this rule will also allow the first packets of other connections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77394"&gt;@jessica-davis&lt;/a&gt;this rule does not allow any connection towards the internet, but as I wrote that the firewall need to allow some packets to bo able to filter on URLs, some packets need to be allowed. So filtering based on URLs (no matter if you create an app or do it the way you already did) will always have this "sideeffect". And as soon the firewall sees that the connection does not match one of the URLs in your custom category, it evaluates the ruleset again to check if there is another match for this connection and probably dropps the connection as I assume there is no other rule because you want to restrict the internetacces as much as possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 10 May 2018 13:01:36 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-05-10T13:01:36Z</dc:date>
    <item>
      <title>Creating a global, URL based whitelist rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213817#M62171</link>
      <description>&lt;P&gt;I'm trying to build a global rule for Sophos cloud based services. I've built a list of all the URLs they use, added the URL list to the URL category part of the rule with the applications web-browsing, ssl, sophos-update and sophos-live-protection, and generally it seemed to work with a small snag. I noticed a LOT of traffic was hitting this rule for the first few packets, until the PAN could determine it wasn't going to one of the listed URLs, then either passing to another rule, or ending the session.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is, we have systems that have highly limited access to the internet, so I want to restrict this down somehow. Unfortunately, Sophos uses multiple CDNs for distribution with short TTLs on the DNS, so the IPs can change minute to minute, and generating a complete list of IPs isn't really feasible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a good way to make a single rule for 'allow everyone inside going to this URL/URL category' without catching basically all internet bound traffic?&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 22:27:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213817#M62171</guid>
      <dc:creator>jessica-davis</dc:creator>
      <dc:date>2018-05-09T22:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a global, URL based whitelist rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213894#M62182</link>
      <description>&lt;P&gt;what about a custom application?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use the hostnames from your URLs to match in the http-req-host-header and the paths (if needed) to match http-req-uri-path, that way this traffic will be able to pass to another rule if it does not match the application.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;URL filtering is not a match criteria to determine what rule applies to a session.&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 11:11:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213894#M62182</guid>
      <dc:creator>JoeAndreini</dc:creator>
      <dc:date>2018-05-10T11:11:51Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a global, URL based whitelist rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213898#M62184</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77394"&gt;@jessica-davis&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I think&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83021"&gt;@JoeAndreini&lt;/a&gt;'s answer is about as good as you could hope for with what you are trying to accomplish. However this would only&amp;nbsp;&lt;EM&gt;really&lt;/EM&gt; work if you have already implemented SSL Decryption. CDNs get near impossible to work with if you can't see the entire&amp;nbsp;request.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 12:59:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213898#M62184</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-05-10T12:59:08Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a global, URL based whitelist rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213899#M62185</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83021"&gt;@JoeAndreini&lt;/a&gt;&amp;nbsp;this actually is another way to do what &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77394"&gt;@jessica-davis&lt;/a&gt;&amp;nbsp;already did. Here it depends on what you prefer. If you use the URL category directly in your security rule and not with an URL profile it is a filtering criteria, but because the firewall needs some packets to get to the http request/tls client hello this rule will also allow the first packets of other connections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77394"&gt;@jessica-davis&lt;/a&gt;this rule does not allow any connection towards the internet, but as I wrote that the firewall need to allow some packets to bo able to filter on URLs, some packets need to be allowed. So filtering based on URLs (no matter if you create an app or do it the way you already did) will always have this "sideeffect". And as soon the firewall sees that the connection does not match one of the URLs in your custom category, it evaluates the ruleset again to check if there is another match for this connection and probably dropps the connection as I assume there is no other rule because you want to restrict the internetacces as much as possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 13:01:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213899#M62185</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-05-10T13:01:36Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a global, URL based whitelist rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213901#M62187</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;You are absolutely right when you need to filter on parts of the URL after the FQDN, but if not this works in almost all cases without having decryptiom enabled. This is at least my experience with applying URL filtering without TLS decryption (--&amp;gt; SNI/hostname extension in the TLS client hello packet)&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 13:06:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213901#M62187</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-05-10T13:06:18Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a global, URL based whitelist rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213903#M62189</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If I recall correctly with Sophos CDN you actually do need to filter on parts of the URL and not strictly what the firewall can see in the SNI.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 13:25:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213903#M62189</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-05-10T13:25:25Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a global, URL based whitelist rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213906#M62191</link>
      <description>&lt;P&gt;Ok, then it is clear &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 13:37:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213906#M62191</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-05-10T13:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a global, URL based whitelist rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213988#M62211</link>
      <description>&lt;P&gt;Thank you for that. That's what I was thinking as I saw the behavior, was just hoping to avoid the rule logging so much just...random noise. I'm trying a few other things, namely pulling a list of the various destination host names being hit and hoping I can build a list of FQDN address objects to mitigate it slightly. I&amp;nbsp;have to straighten out some DNS issues before that's a viable option, though. Thank you for the suggestions!&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 23:39:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-global-url-based-whitelist-rule/m-p/213988#M62211</guid>
      <dc:creator>jessica-davis</dc:creator>
      <dc:date>2018-05-10T23:39:30Z</dc:date>
    </item>
  </channel>
</rss>

