<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block layer 4 traffic for destination blocked on URL filtering in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/block-layer-4-traffic-for-destination-blocked-on-url-filtering/m-p/339508#M85248</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/149567"&gt;@Biswa&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the URL filtering approach you have to keep in mind how a PaloAlto firewall is able to allow traffic based on URLs. So in order to see the URL, the firewall needs to allow traffic until the first http get or TLS client hello. This means at least the TCP handshake neds to be allowed generally to even see the packet required for the URL filtering. So actually even when nmap is able to connect, a complete connection to anx website shouldn't be possible. What you could do is keep the URL profile and also add one or more IP ranges for the PaaS service to further restrict the connection.&lt;/P&gt;</description>
    <pubDate>Sun, 19 Jul 2020 21:08:17 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2020-07-19T21:08:17Z</dc:date>
    <item>
      <title>Block layer 4 traffic for destination blocked on URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-layer-4-traffic-for-destination-blocked-on-url-filtering/m-p/339502#M85247</link>
      <description>&lt;P&gt;We have a very peculiar situation. There is Azure public PaaS environment connected over express route and we have a Palo inline. Now the destination ip/subnet range is dynamic but we just end to allow few specific URLs. It was all fine where we had url filtering allowing the required destinations and blocked everything while testing from a web browser. However, when tested from any non-browser tool (eg namp), we were able to connect with the destinations over tcp/80 or tcp/443, even though these destinations are blocked under url filtering. Is there anyway to allow access to specific destinations and block (layer 4) everything else ? I tried it with FQDN security rules and it worked.&amp;nbsp; But the destinations dns records have TTL value in range if seconds to 1 minutes. So fqdn based policy is not a good option for us.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2020 20:20:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-layer-4-traffic-for-destination-blocked-on-url-filtering/m-p/339502#M85247</guid>
      <dc:creator>Biswa</dc:creator>
      <dc:date>2020-07-19T20:20:51Z</dc:date>
    </item>
    <item>
      <title>Re: Block layer 4 traffic for destination blocked on URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-layer-4-traffic-for-destination-blocked-on-url-filtering/m-p/339508#M85248</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/149567"&gt;@Biswa&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the URL filtering approach you have to keep in mind how a PaloAlto firewall is able to allow traffic based on URLs. So in order to see the URL, the firewall needs to allow traffic until the first http get or TLS client hello. This means at least the TCP handshake neds to be allowed generally to even see the packet required for the URL filtering. So actually even when nmap is able to connect, a complete connection to anx website shouldn't be possible. What you could do is keep the URL profile and also add one or more IP ranges for the PaaS service to further restrict the connection.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2020 21:08:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-layer-4-traffic-for-destination-blocked-on-url-filtering/m-p/339508#M85248</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-07-19T21:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: Block layer 4 traffic for destination blocked on URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-layer-4-traffic-for-destination-blocked-on-url-filtering/m-p/339568#M85271</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do have URL profile, however, minimizing the destination IP range doesn't actually help. Reason is we need to allow whole PaaS IP range as these ranges are not fixed per organisation. The problem with getting tcp/80 or 443 being allowed is that even though I can't do much at application layer still I was able to pass on good amount data (tested with a 250meg txt file) and firewall was allowing this as we didn't have deny rule for unknown-tcp. The other thing I noticed is that firewall was able to change the app-id from web-browsing to unknown-tcp after 3.2k data transmission. So even if I add deny rule for unknown-tcp, someone can still pass on 3.2k of data.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Palo App-id.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26929iDB71FEAFA584D814/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Palo App-id.png" alt="Palo App-id.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 11:14:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-layer-4-traffic-for-destination-blocked-on-url-filtering/m-p/339568#M85271</guid>
      <dc:creator>Biswa</dc:creator>
      <dc:date>2020-07-20T11:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: Block layer 4 traffic for destination blocked on URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/block-layer-4-traffic-for-destination-blocked-on-url-filtering/m-p/339569#M85272</link>
      <description>&lt;P&gt;Got it. But using the whole PaaS IP range is probably still a lot better than 'any'. And as you saw it correctly by further restrictions that only allow ssl/web-browsing you should getting closer to what you want. In general it is not easy with such dynamic services ...&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 11:28:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/block-layer-4-traffic-for-destination-blocked-on-url-filtering/m-p/339569#M85272</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-07-20T11:28:32Z</dc:date>
    </item>
  </channel>
</rss>

