<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security Policy filtering  HTTP/S traffic over all ports in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-filtering-http-s-traffic-over-all-ports/m-p/419651#M93808</link>
    <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;Has anybody made a rule that filters the traffic by HTTP/S protocol no matter what the port is?&lt;/P&gt;&lt;P data-unlink="true"&gt;what I mean is for the FW to detect a client trying to access https://randomwebsite:X&amp;nbsp;where X can be any port from 1-65535&lt;/P&gt;&lt;P&gt;running ver 9.1.8&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 15 Jul 2021 13:59:09 GMT</pubDate>
    <dc:creator>RSennin</dc:creator>
    <dc:date>2021-07-15T13:59:09Z</dc:date>
    <item>
      <title>Security Policy filtering  HTTP/S traffic over all ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-filtering-http-s-traffic-over-all-ports/m-p/419651#M93808</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;Has anybody made a rule that filters the traffic by HTTP/S protocol no matter what the port is?&lt;/P&gt;&lt;P data-unlink="true"&gt;what I mean is for the FW to detect a client trying to access https://randomwebsite:X&amp;nbsp;where X can be any port from 1-65535&lt;/P&gt;&lt;P&gt;running ver 9.1.8&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jul 2021 13:59:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-filtering-http-s-traffic-over-all-ports/m-p/419651#M93808</guid>
      <dc:creator>RSennin</dc:creator>
      <dc:date>2021-07-15T13:59:09Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy filtering  HTTP/S traffic over all ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-filtering-http-s-traffic-over-all-ports/m-p/419686#M93812</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/186599"&gt;@RSennin&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could use a url-category object (Objects --&amp;gt; Custom Object --&amp;gt; URL Category). Custom url categories do not require a URL filter license.&lt;/P&gt;&lt;P&gt;If you also have SSL decryption in place, you should be able to identify (and react accordingly) this access.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jul 2021 15:31:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-filtering-http-s-traffic-over-all-ports/m-p/419686#M93812</guid>
      <dc:creator>JoergSchuetter</dc:creator>
      <dc:date>2021-07-15T15:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy filtering  HTTP/S traffic over all ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-filtering-http-s-traffic-over-all-ports/m-p/419809#M93824</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/186599"&gt;@RSennin&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Due to the way that you would have to build such a rule out, I&amp;nbsp;&lt;EM&gt;really&amp;nbsp;&lt;/EM&gt;wouldn't recommend doing anything like this unless you can be more restrictive. If you just built out a rule that allows ssl and web-browsing to any service with a url-category specified as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/83320"&gt;@JoergSchuetter&lt;/a&gt;&amp;nbsp;mentioned that would "work", but to have that rule function the firewall needs to allow enough traffic to pass to identify the application and the URL which means you're allowing far more traffic than you would really want to be.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you absolutely have to do this narrow it down as much as possible so that you're filtering by destination address, even if you just have to build out an FQDN address object for the website and use that.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jul 2021 02:12:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-filtering-http-s-traffic-over-all-ports/m-p/419809#M93824</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-07-16T02:12:02Z</dc:date>
    </item>
  </channel>
</rss>

