<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security policy using wildcard destinations and NON http/https protocols in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-using-wildcard-destinations-and-non-http-https/m-p/284726#M76340</link>
    <description>&lt;P&gt;Dear community&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are dealing with a request for a firewall rule which is supposed to allow SMB traffic (TCP 445) to a wildcard destination like *.subdomain.example.com out on the internet. So this made me think about how we should implement such a rule and I am not even sure it can be done or at least I don't know how. If this would be HTTP/HTTPS traffic we could create a customer URL category in order to be used in a rule with an allow action. But when the protocol isn't HTTP/HTTPS but something like SMB or SSH and so on, I don't think the URL category will be a factor. Also creating a FQDN object is not an option since it won'd allow wildcards.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other ideas or suggestions from your side? Many thanks and regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tibor&lt;/P&gt;</description>
    <pubDate>Fri, 23 Aug 2019 07:16:30 GMT</pubDate>
    <dc:creator>TiborNad</dc:creator>
    <dc:date>2019-08-23T07:16:30Z</dc:date>
    <item>
      <title>Security policy using wildcard destinations and NON http/https protocols</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-using-wildcard-destinations-and-non-http-https/m-p/284726#M76340</link>
      <description>&lt;P&gt;Dear community&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are dealing with a request for a firewall rule which is supposed to allow SMB traffic (TCP 445) to a wildcard destination like *.subdomain.example.com out on the internet. So this made me think about how we should implement such a rule and I am not even sure it can be done or at least I don't know how. If this would be HTTP/HTTPS traffic we could create a customer URL category in order to be used in a rule with an allow action. But when the protocol isn't HTTP/HTTPS but something like SMB or SSH and so on, I don't think the URL category will be a factor. Also creating a FQDN object is not an option since it won'd allow wildcards.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other ideas or suggestions from your side? Many thanks and regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tibor&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 07:16:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-using-wildcard-destinations-and-non-http-https/m-p/284726#M76340</guid>
      <dc:creator>TiborNad</dc:creator>
      <dc:date>2019-08-23T07:16:30Z</dc:date>
    </item>
    <item>
      <title>Re: Security policy using wildcard destinations and NON http/https protocols</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-using-wildcard-destinations-and-non-http-https/m-p/284738#M76342</link>
      <description>&lt;P&gt;if using internal DNS with an external forwarder it would be possible to log all requests/responses for&amp;nbsp;&lt;SPAN&gt;*.subdomain.example.com and forward these via API to a dynamic address group on the PA.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;not for me.... but it is an option...&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 09:25:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-using-wildcard-destinations-and-non-http-https/m-p/284738#M76342</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-08-23T09:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: Security policy using wildcard destinations and NON http/https protocols</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-using-wildcard-destinations-and-non-http-https/m-p/284747#M76343</link>
      <description>&lt;P&gt;Thank you very much. This is a interesting option I would never have considered. Your input is very much appreciated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other suggestions? Or can someone confirm my feeling that URL categories will not have any impact at all?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 11:33:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-using-wildcard-destinations-and-non-http-https/m-p/284747#M76343</guid>
      <dc:creator>TiborNad</dc:creator>
      <dc:date>2019-08-23T11:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: Security policy using wildcard destinations and NON http/https protocols</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-using-wildcard-destinations-and-non-http-https/m-p/284841#M76355</link>
      <description>&lt;P&gt;The Url categories are determined by http&amp;nbsp;“Get” command so no chance... &amp;nbsp;the only other time url cats will kick in is when perhaps something like smtp traffic is encrypted via tls. palo&amp;nbsp;will then use certificate details to guess the category&amp;nbsp;Just like undecrypted https traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;wildcards cannot be used in fqdn as palo&amp;nbsp;turns your string into a regex&amp;nbsp;kinda dns search... the search criteria is within square brackets and cannot include some special characters such as an asterisk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry wouldnot acept unencrypted but it has now...&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 18:20:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-using-wildcard-destinations-and-non-http-https/m-p/284841#M76355</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-08-23T18:20:58Z</dc:date>
    </item>
  </channel>
</rss>

