10-17-2016 08:46 AM
I have configured EDL of type Dynamic URL Lists with the next configuration
Then in URL filtering profile the ransomwaretracker_URL category is configured as BLOCK and the Profile is applied in the Security rule.
It seems configured correctly, I can list the EDL in CLI, but if I try to go to listed URL, it does not blocked.
PAN is working with 7.1.2 version.
10-17-2016 08:51 AM - edited 10-17-2016 08:55 AM
Can you remove the 'https://' and try that? The documentation says not to use this prefix.
Can you also check your traffic logs and security policies and see if the allowed traffic is hitting a rule above or below the rule you have configured?
Try this command to see if your EDL has populated ok:
> request system external-list show type url (EDL name)
You can add your list to a URL filtering profile and add that profile to the policy:
hope this helps,
10-17-2016 09:28 AM
Does it work as expected if you build a Deny rule with your EBL as the source address? This list is also 4992 entries which may be pushing the number of address objects you can push in one EBL. If you have anything less than a 3050, 3060, or a 5020 and up then you aren't going to be able to use this list.
10-17-2016 11:38 AM - edited 10-17-2016 12:07 PM
It is a bit away from the original post/question but I recall a discussion here about the limit of entries :
More info here:
10-17-2016 12:01 PM
@TranceforLife I believe those limits only cover 7.1. I've always gone off of what's listed here https://live.paloaltonetworks.com/t5/Learning-Articles/Working-with-External-Block-List-EBL-Formats-... unless people actually point out that they are running 7.1.* since most people seem to be ignoring it for now.
10-17-2016 12:11 PM
the user is running 7.1.2 PAN-OS
10-17-2016 01:10 PM
ahh my bad.
10-17-2016 01:20 PM - edited 10-17-2016 01:27 PM
l have just tested trying using http, getting redirected to https. If it is listed on firewall through the cli that is fine, should work. Also could run test button to see if you are connected successfully. Should just work. Please follow link posted by BPry:
10-18-2016 05:13 AM
Thanks for your opinions. The device is a PAN 3020 and I think that the list are supported, the number of entries is ok.
I have tried to configure the list without https but continues without block the URLs listed in file.
The test source URL is correct, the list can be oppened.
The traffic do match in rule with the profile applied.
10-18-2016 06:06 AM
@COMIP I just tried to run that list on my own 3020 and while the link tests okay it wasn't able to actually pull anything from the list; I would assume because of the formatting. Can you run the command request system external-list show name (name) with the correct name of your list and see if there is actually anything within the list? You could also do a refresh instead of a show and monitor the specific job of the DBL refresh and see if it actually completes.
10-18-2016 08:10 AM
The list is opened when the command is executed.
impala@FW_VM401(active)> request system external-list show type url name ransomwaretracker_URL
Next update at : Tue Oct 18 18:00:29 2016
Source : ransomwaretracker.abuse.ch/downloads/RW_URLBL.txt
Referenced : Yes
Valid : Yes
Total valid entries : 4992
Total invalid entries : 8
10-18-2016 08:29 AM
10-18-2016 08:45 AM
Yes, URL Filtering is working.
10-18-2016 08:55 AM
@COMIP If URL is working and you have the rules setup for both incoming and outgoing traffic then I think the next step would be a TAC case. I would question how your rules are setup however, as you are going to need both one incoming and one outgoing if you are trying to test it by going to those websites.
10-19-2016 02:26 AM
Yes the profiles are applied in both directions.
Thanks for your answers, I'm going to open a case.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!