URL Log displays a lot of '%16%03%01/' as url for SSL traffic

cancel
Showing results for 
Search instead for 
Did you mean: 

URL Log displays a lot of '%16%03%01/' as url for SSL traffic

L1 Bithead

What's wrong with the URL filtering and logging of the PaloAlto FW? We have many URL logs like '%16%03%01/' when users visit SSL websites.

Is URL detection for SSL websites broken?

Are there other users who have this problems?

We are not 100% sure but it seems this log happens only when Internet Explorer 8 is used. But still investigating

Regards,

O. Bor

1 ACCEPTED SOLUTION

Accepted Solutions

L7 Applicator

Yes, there is some issue with the version 390. Engineering is currently working on it. The issue is that the SSL sites are being categorized as "private-ip-addresses" after upgrading the content to version 390.


Issue reported as:-  "SSL sites are being categorized as 'private-ip-addresses' after upgrading content to version 390". Only IE8 seems to be affected.... Chrome, Firefox and IE9 seem to be not be affected. As of now, the workaround would be to revert to content version 389/ update to  content version 391 or do not block 'private-ip-address' category.


Thanks

View solution in original post

9 REPLIES 9

L4 Transporter

What is the Apps and threat content version on the firewall ? Is it 390 ?

There is a known issue in version 390. I would recommend you to upgrade to the new version 391 which was released few hours ago. That should resolve.

L7 Applicator

Yes, there is some issue with the version 390. Engineering is currently working on it. The issue is that the SSL sites are being categorized as "private-ip-addresses" after upgrading the content to version 390.


Issue reported as:-  "SSL sites are being categorized as 'private-ip-addresses' after upgrading content to version 390". Only IE8 seems to be affected.... Chrome, Firefox and IE9 seem to be not be affected. As of now, the workaround would be to revert to content version 389/ update to  content version 391 or do not block 'private-ip-address' category.


Thanks

View solution in original post

L1 Bithead

I was aware of the problems with 390 and a few hours ago we have upgraded to 391 and we have still these url logs. Thats why i posted this to ask if more people have the same issue. So it seems that 391 is still having this issue.

Thanks for all responses.

Are these sites being categorized as "private-ip-address" with version 391 ?

yes, these sites are still categorized as "private-ip-addresses" with in version 391. I have already cleared my url cache and dynamic host cache.


L3 Networker

Thanks so much for this info. I have been sitting here scratching my head and talking to my support people who didn't have a clue either. I would have thought it would be URL filtering or something, not Application and threat.

Sticking with 389 for now until this is resolved.

L5 Sessionator

Hi,


We have just verified that the issue is resolved in 391 and are not seeing it anymore. Please verify the device did upgrade to latest content version.

You can use "show system info" command to verify that.

However if you are seeing the issue please open a case with TAC so we can look at the issue and get it to closure.

Thank you

Numan

yes, we are running version 391. But we managed To gather more info and we only see these log when users visit the salesforce.com website. Salesforce is an appid, and no salesforce app detection but SSL app detection and wrong URL and category.

maybe this info can help.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!