How to tune wildfire rules

Reply
Highlighted
L3 Networker

How to tune wildfire rules

I am on a PA2050 using 4.1.12 in Device/Setup/Wildfire I have Wildfire enabled.  In Objects / Security Profiles / File Blocking I have rules that "ALERT" and "FORWARD" on certain file types.

My rule base for USERS connecting to the INTERNET consists of rules that allow certain AD groups access to certain PROFILES.   These profiles include data filtering, antivirus, and URL FILTERING.

The problem I have is that Google Maps and Google Earth generates a very large number of alerts due to all the archives sent to the browser.  Much of this traffic is determined to be ZIP by the Palo Alto.  I would like to exclude Google Maps and Google Earth files from alerting on ZIPs, though I don't want to stop alerting on other Google Services.

Attached is a screen shot of this traffic.  If I can figure out how to do this with Google Earth and Google Maps then there are some other platforms I would like to exclude.

Can what I ask reasonably be done?

Highlighted
L7 Applicator

Create a new security rule above the rule where your file blocking profile is currently catching the Zip files.  In this new security rule, allow only google-maps and google-earth.  From here, you can do a few things.  1.) you could opt not to attach any file blocking profiles to these two applications, or you could create a customized file blocking profile that does not include ZIPs.   

Highlighted
L3 Networker

Attached is a small section of my rules.   These rules have profiles associated with them which include URL filtering, Data filtering, and so on.  Some groups have Google Earth, Google Maps, both, or none.

If I stick a rule above all these rules which allows Google Earth and Google maps, then I'm breaking my URL filtering as the allow rule would allow this traffic regardless of what the subsequent rules state.

I would need to duplicate every single one of these rules that allow Google Earth and/or Google Maps and set the top duplicate rule to allow the platform without data filtering, correct?

Capture.png

L7 Applicator

The file blocking profile is applied per-rule.  So, if you wish to use a different file blocking policy for some apps (google-maps, google-earth) than other apps (gmail, web-browsing, ssl, anything else), then you must separate out their traffic into different rules.  Yes, in your case, you could duplicate each group's security policy rule, modify the application to be goggle-maps and/or google-earth) use a different file blocking profile just for those two apps. 

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!