<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Question about outbound hostname restrictions in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224790#M64521</link>
    <description>&lt;P&gt;In speaking to PAN support, looks like we'd have to do a reverse DNS lookup for the internal hosts, which may be resource intensive. I will explore the ID of scraping the DHCP configuration though. That should be less resource intensive. The client state will be difficult to change at the moment. May be worth investigating though down the road as an alternative roadmap.&lt;/P&gt;</description>
    <pubDate>Fri, 03 Aug 2018 22:12:08 GMT</pubDate>
    <dc:creator>murphyca</dc:creator>
    <dc:date>2018-08-03T22:12:08Z</dc:date>
    <item>
      <title>Question about outbound hostname restrictions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224634#M64479</link>
      <description>&lt;P&gt;I'm familiar with user based restrictions to outbound resources, such as youtube, but is it possible with say, a regex expression, to block access to a site like youtube&amp;nbsp;through a list of machines that include a name like kiosk, as in cakiosk01, cokiosk02, flakiosk03, etc. ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Aug 2018 17:46:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224634#M64479</guid>
      <dc:creator>murphyca</dc:creator>
      <dc:date>2018-08-02T17:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: Question about outbound hostname restrictions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224658#M64482</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;In the past what I have done is put the kiosks/guest machines onto their own vlan and hten write the policy around the source IP's.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 02 Aug 2018 18:57:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224658#M64482</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-08-02T18:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: Question about outbound hostname restrictions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224755#M64510</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/94697"&gt;@murphyca&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Not something that you could do on the box. The VLAN option that&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;presented is a good option. Otherwise you could simply collect the DHCP logs and look at which IP the machines are grabbing and add them to as an address-object with a given tag; this tag could then be used to build out a dynamic address-group. Doing this programatically would likely be best.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As an example:&lt;/P&gt;&lt;P&gt;Schedule some sort of scripting language like Python to scour the DHCP logs for the machine name. Once the machine name is found grab the IP from the log and use that value to update the address object with the recorded IP through the API. Then you just need to schedule the script to pull the DHCP logs every once in a while to keep everything updated.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 16:36:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224755#M64510</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-08-03T16:36:24Z</dc:date>
    </item>
    <item>
      <title>Re: Question about outbound hostname restrictions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224758#M64512</link>
      <description>&lt;P&gt;Do you mean to block from a specific source by client hostname? The client's hostname is never sent as part of their HTTP request, so there would be nothing to trigger on there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd recommend setting up user-id so that you have the username logged into the kiosks and can simply apply a URL filtering policy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you're going&amp;nbsp;&lt;STRONG&gt;TO&amp;nbsp;&lt;/STRONG&gt;a site with the name "kiosk" in the host header, you can set up a custom vulnerability or spyware signature using the host header as the context and a regex of "..kiosk0.+" (not tested) that could trigger for you.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 17:25:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224758#M64512</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2018-08-03T17:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: Question about outbound hostname restrictions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224778#M64514</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/94697"&gt;@murphyca&lt;/a&gt;&amp;nbsp;What you actually asking for is - as already mentionned - not possible. But depending on the configurarion of your network and these computers there are some ways for this:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;DHCP Reservations so that these computers always get rhe same IPs and you then could create addressobjects for&lt;/LI&gt;&lt;LI&gt;Seperate VLAN for these computers as written by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;(probably a good idea anyway to seperate these computers from the rest of your network)&lt;/LI&gt;&lt;LI&gt;Configure a default user that is logged in automatically, so you will be able to write user-based rules (as mentionned by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;)&lt;/LI&gt;&lt;LI&gt;Parse the DHCP logs to create dynamic addressgroups which you can use as source in your policy (as proposed by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;)&lt;/LI&gt;&lt;LI&gt;Use FQDN addressobjects which the firewall will update according to the TTL of the DNS entry&lt;/LI&gt;&lt;LI&gt;Configure the computers browsers to use custom user agent strings and create a custom application that matches on this user agent string&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 03 Aug 2018 19:37:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224778#M64514</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-08-03T19:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: Question about outbound hostname restrictions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224789#M64520</link>
      <description>&lt;P&gt;The challenge is over 400 remote locations feeding through corporate. The architecture would be difficult to change from that perspective. Possible, but difficult.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 22:08:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224789#M64520</guid>
      <dc:creator>murphyca</dc:creator>
      <dc:date>2018-08-03T22:08:43Z</dc:date>
    </item>
    <item>
      <title>Re: Question about outbound hostname restrictions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224790#M64521</link>
      <description>&lt;P&gt;In speaking to PAN support, looks like we'd have to do a reverse DNS lookup for the internal hosts, which may be resource intensive. I will explore the ID of scraping the DHCP configuration though. That should be less resource intensive. The client state will be difficult to change at the moment. May be worth investigating though down the road as an alternative roadmap.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 22:12:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224790#M64521</guid>
      <dc:creator>murphyca</dc:creator>
      <dc:date>2018-08-03T22:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: Question about outbound hostname restrictions</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224791#M64522</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;One other thing I have done in the past is kind of is use user-id and have those kiosks and desk users excluded. What I mean is create a web browsing policy and select the source user as /domain-users, this way all domain users get the less restrictive policy. Then a second policy after that one for everything else and have a more restrictive policy. So if a user just see's a kiosk and opens the browser, they get the more restrictive policy since that IP is not mapped to a user-id.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 22:25:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-about-outbound-hostname-restrictions/m-p/224791#M64522</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-08-03T22:25:00Z</dc:date>
    </item>
  </channel>
</rss>

