<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic External Dynamic List in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/external-dynamic-list/m-p/285978#M76524</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are planning to use&amp;nbsp;&lt;SPAN&gt;URL type EDL (external dynamic list) in a security policy rule / URL filtering profile.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Does PA translate the URL in the external dynamic list to IP address? using FQDN refresh (like if we created an FQDN object in the firewall)&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How does it work exactly? any inputs would be appreciated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 30 Aug 2019 11:18:10 GMT</pubDate>
    <dc:creator>L1_ENG</dc:creator>
    <dc:date>2019-08-30T11:18:10Z</dc:date>
    <item>
      <title>External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-dynamic-list/m-p/285978#M76524</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are planning to use&amp;nbsp;&lt;SPAN&gt;URL type EDL (external dynamic list) in a security policy rule / URL filtering profile.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Does PA translate the URL in the external dynamic list to IP address? using FQDN refresh (like if we created an FQDN object in the firewall)&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How does it work exactly? any inputs would be appreciated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2019 11:18:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-dynamic-list/m-p/285978#M76524</guid>
      <dc:creator>L1_ENG</dc:creator>
      <dc:date>2019-08-30T11:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-dynamic-list/m-p/286011#M76527</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/121038"&gt;@L1_ENG&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The fqdn address objects are very different to the EDL. Even though you input a fqdn, from policy perspective it is still IP address object, even though the IP can change based on the preidic fqdn resolution.&lt;/P&gt;&lt;P&gt;EDL are just text files, which can be of URL, domain or IP address type. The IP EDL can be used as policy address match, similar to any other address object and group. However the URL type EDL can only be used in URL filtering profiles or in the URL Category match section of the security policies. URLs in the list are not resolved, because a EDL can have thousands of entries and it could introduce large processing overhead.&lt;/P&gt;&lt;P&gt;You can potentially use some external servers to resolve list of URL and convert it to an IP address list, which can be presented to the firewall. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2019 13:38:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-dynamic-list/m-p/286011#M76527</guid>
      <dc:creator>BatD</dc:creator>
      <dc:date>2019-08-30T13:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-dynamic-list/m-p/286012#M76528</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/74884"&gt;@BatD&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your explanation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any experience/input in blocking well known malicious domain/URL on Palo?&lt;/P&gt;&lt;P&gt;which options should we use? FQDN object/URL filtering or DNS sinkhole to block inbound and outbound traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2019 14:02:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-dynamic-list/m-p/286012#M76528</guid>
      <dc:creator>L1_ENG</dc:creator>
      <dc:date>2019-08-30T14:02:00Z</dc:date>
    </item>
    <item>
      <title>Re: External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-dynamic-list/m-p/286013#M76529</link>
      <description>&lt;P&gt;Ideally you should use all methods, as they complement each other. The fqdn address objects are probably not suitable in this case, because you will have to creat too many, however you can have EDL feeds of known bad URL, in addition to using the Palo Alt URL filteing categories. DNS Synchole should be applied to user traffic, however it is not designed to block malicous URL, but rather than to detect users which are already infected.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2019 15:16:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-dynamic-list/m-p/286013#M76529</guid>
      <dc:creator>BatD</dc:creator>
      <dc:date>2019-08-30T15:16:35Z</dc:date>
    </item>
  </channel>
</rss>

