URL Filtering

Reply
Highlighted
L2 Linker

URL Filtering

I changed some rules around to secure things a little more. I need to allow Netflix/YouTube either by user or subnet because it is now blocked with my changes. What is best practice to create a new policy to do so? I currently have a staff and student URL filtering policy in place.


Accepted Solutions
Highlighted
L7 Applicator

URL filtering happens at layer7 whereas traffic log is typically layer3 type of stuff, so it is perfectly possible to allow a tcp session in traffc logs and then block the url due to url filtering profile. The zebbrowsing session is blocked because the website category is bad, but the tcp communication underneath happens normally (hence an allow in traffic log)

 

It is best practice to build a policy based around User-ID as this will allow your users to all occupy the same IP space without you needing to set reservations to make sure certain people get specific access (and the potential of someone else figuring out the IP and hijacking it to get privileges)

Tom Piens - PANgurus.com
Find my book at amazon.com/dp/1789956374

View solution in original post


All Replies
Highlighted
L2 Linker

I see what I want allow blocked on the URL filtering log but not the Traffic log. Application type Netflix-base for appears allowed in Traffic log but action is block-url in the URL filtering log.

Highlighted
L7 Applicator

URL filtering happens at layer7 whereas traffic log is typically layer3 type of stuff, so it is perfectly possible to allow a tcp session in traffc logs and then block the url due to url filtering profile. The zebbrowsing session is blocked because the website category is bad, but the tcp communication underneath happens normally (hence an allow in traffic log)

 

It is best practice to build a policy based around User-ID as this will allow your users to all occupy the same IP space without you needing to set reservations to make sure certain people get specific access (and the potential of someone else figuring out the IP and hijacking it to get privileges)

Tom Piens - PANgurus.com
Find my book at amazon.com/dp/1789956374

View solution in original post

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!