<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security Policy Best Practice in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-best-practice/m-p/254494#M72232</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I've read multiple documents from PA and read some on the forums here, but cannot find anything definitive on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I'm trying to find out is what is the best practice/most effective way to configure a Security Policy for filtering. I understand there are several ways to do this, but I've found that the way I've been doing it doesn't always seem to work the best. Are there any issues with the following config?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Create a Security Policy and set the Action to Allow. Set a URL Filtering Profile. Create a Custom URL Category for Allowed URLs. Create a Custom URL Category for Denied URLs. Apply these Custom URL Categories inside the URL Filtering Profile. Set other categories to Deny within the URL Filtering Profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I were to set the Action for a Security Policy to Deny, does that Deny all traffic that matches?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice will be very helpful. Thanks.&lt;/P&gt;</description>
    <pubDate>Thu, 21 Mar 2019 14:21:32 GMT</pubDate>
    <dc:creator>GCSS-RT</dc:creator>
    <dc:date>2019-03-21T14:21:32Z</dc:date>
    <item>
      <title>Security Policy Best Practice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-best-practice/m-p/254494#M72232</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I've read multiple documents from PA and read some on the forums here, but cannot find anything definitive on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I'm trying to find out is what is the best practice/most effective way to configure a Security Policy for filtering. I understand there are several ways to do this, but I've found that the way I've been doing it doesn't always seem to work the best. Are there any issues with the following config?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Create a Security Policy and set the Action to Allow. Set a URL Filtering Profile. Create a Custom URL Category for Allowed URLs. Create a Custom URL Category for Denied URLs. Apply these Custom URL Categories inside the URL Filtering Profile. Set other categories to Deny within the URL Filtering Profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I were to set the Action for a Security Policy to Deny, does that Deny all traffic that matches?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice will be very helpful. Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 14:21:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-best-practice/m-p/254494#M72232</guid>
      <dc:creator>GCSS-RT</dc:creator>
      <dc:date>2019-03-21T14:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Best Practice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-best-practice/m-p/254509#M72235</link>
      <description>&lt;P&gt;The action of the security policy works at the network layer, so it interrupts a flow of packets, whereas a security profile interacts with layer7, so a url blocking profile will throw up a blocked page instead of the actual webpage, from the network layer perspective the traffic will act normally&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A 'block' security policy will never use security profiles as the packets are blocked before that rule would engage security profiles&lt;/P&gt;
&lt;P&gt;Your rule needs to be allow, and with your profiles set, only the allowed custom category urls will be allowed and all others will create block pages for the users&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is an in-between solution, where you apply a custom URL category in the 'services' of the security policy&lt;/P&gt;
&lt;P&gt;This works as a sort of ip-lookup and only allow/deny traffic&amp;nbsp; for the "ips" that match the urls in your custom category&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 14:43:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-best-practice/m-p/254509#M72235</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-03-21T14:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy Best Practice</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-best-practice/m-p/254600#M72254</link>
      <description>&lt;P&gt;Thanks for great explanation.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 23:54:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-best-practice/m-p/254600#M72254</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-03-21T23:54:51Z</dc:date>
    </item>
  </channel>
</rss>

