<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic URL Filtering different with browser and application in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-different-with-browser-and-application/m-p/239041#M68465</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a server, from where the user wants to go to, for example, abc.xyz.com.&lt;/P&gt;&lt;P&gt;The certificate from the website xyz.com has a CN *.xyz.com.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We dont have decryption for URL Filtering. In the URL Filtering category, we have allowed&amp;nbsp;&lt;SPAN&gt;abc.xyz.com.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The user on the server wants to use an application which initiates a connection to&amp;nbsp;abc.xyz.com.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Now,&lt;/P&gt;&lt;P&gt;When the user opens a browser and goes to&amp;nbsp;&lt;SPAN&gt;abc.xyz.com, then the connection is allowed as the firewall sees the URL as&amp;nbsp;abc.xyz.com.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When the user uses his application, the the firewall sees the request to *.xyz.com and blocks it.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If we allow *.xyz.com then the application works.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Anyone have same experience? Any workaround without decryption?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;BR,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;RJ&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 08 Nov 2018 09:51:15 GMT</pubDate>
    <dc:creator>rjdahav163</dc:creator>
    <dc:date>2018-11-08T09:51:15Z</dc:date>
    <item>
      <title>URL Filtering different with browser and application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-different-with-browser-and-application/m-p/239041#M68465</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a server, from where the user wants to go to, for example, abc.xyz.com.&lt;/P&gt;&lt;P&gt;The certificate from the website xyz.com has a CN *.xyz.com.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We dont have decryption for URL Filtering. In the URL Filtering category, we have allowed&amp;nbsp;&lt;SPAN&gt;abc.xyz.com.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The user on the server wants to use an application which initiates a connection to&amp;nbsp;abc.xyz.com.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Now,&lt;/P&gt;&lt;P&gt;When the user opens a browser and goes to&amp;nbsp;&lt;SPAN&gt;abc.xyz.com, then the connection is allowed as the firewall sees the URL as&amp;nbsp;abc.xyz.com.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When the user uses his application, the the firewall sees the request to *.xyz.com and blocks it.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If we allow *.xyz.com then the application works.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Anyone have same experience? Any workaround without decryption?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;BR,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;RJ&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Nov 2018 09:51:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-different-with-browser-and-application/m-p/239041#M68465</guid>
      <dc:creator>rjdahav163</dc:creator>
      <dc:date>2018-11-08T09:51:15Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering different with browser and application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-different-with-browser-and-application/m-p/239070#M68473</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/44973"&gt;@rjdahav163&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You need to do a wireshark or fiddler capture and see what URLs are actually being called by the application that the user is attempting to use. Fiddler is probably the best solution. IF you can't access the users machine directly for whatever reason create a specific policy for the user and assign a URL profile that has the action of Alert for all categories so that every visited URL will be logged by the firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you look at those logs I'm sure you'll fine additional URLs that you aren't allowing in your URL Filtering profile.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Nov 2018 14:37:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-different-with-browser-and-application/m-p/239070#M68473</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-11-08T14:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering different with browser and application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-different-with-browser-and-application/m-p/239694#M68666</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried your solution with the Profile and Alert as action. In the logs we see the URL as&amp;nbsp; --&amp;gt;&amp;nbsp; &amp;nbsp; *.xyz.com/&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dont know from where the / is coming? Really confused.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;RJ&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 14:06:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-different-with-browser-and-application/m-p/239694#M68666</guid>
      <dc:creator>rjdahav163</dc:creator>
      <dc:date>2018-11-13T14:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering different with browser and application</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-different-with-browser-and-application/m-p/239695#M68667</link>
      <description>&lt;P&gt;&lt;SPAN&gt;*.xyz.com comes probably from name on the certificate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As you are not decrypting traffic then Palo can't see what comes after&amp;nbsp;*.xyz.com/ and URL is logged with / at the end.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You are good if you whitelist&amp;nbsp;*.xyz.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 14:23:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering-different-with-browser-and-application/m-p/239695#M68667</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2018-11-13T14:23:25Z</dc:date>
    </item>
  </channel>
</rss>

