Bottom most Explicit deny all policy not capturing URLs for Url filtering logs.

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Bottom most Explicit deny all policy not capturing URLs for Url filtering logs.

L1 Bithead

So we have a URL filtering profile, which when enabled i can see URL filtering logs for a any any test policy, however there is a Deny All policy we created at the bottom most in policy, I have enabled URL filtering profile for that rule. I am seeing normal network traffic but not any log under Monitor > URL filtering.

Yes we do have URL filtering license, just so you now its working for a test rule where its allowed for any to any and we applied url filtering profile.

JubairJunaid_1-1747822277018.png

 

 

JubairJunaid_0-1747822063272.png

 

Please advice how i can see the denied URL logs. Thanks

 

3 REPLIES 3

Cyber Elite
Cyber Elite

As Palo is dropping packets matching drop/deny rule it can't perform deep packet inspection for this traffic so you can as well not apply security profiles to this policy - they won't be used anyway.

Principal Architect @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

Cyber Elite
Cyber Elite

Just apply URL filtering profile to your outgoing rule where categories you want to permit are set to "alert" and those you don't want to permit are set to "block".

Then you see blocked URL categories matching your general outgoing rule.

Principal Architect @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

Cyber Elite
Cyber Elite

It's important to consider a web browsing session is handled by 2 different 'layers' in the palo alto firewall

first, your security rule will allow or deny a session to flow based on the 6-tuple (source/destination zone, IP, port, protocol). The security rule only looks at basic IP information

Then, a rule can be instructed to also perform layer7 (deep packet) inspection. This causes the firewall to inspect the traffic at a different level and look at, for example, which URL is being requested inside the flow

The URL filtering profile will then determine if a connection is allowed (allow or alert action) or denied (block action) for that specific URL

 

this results in any web browsing session to have 2 verdicts: allow for the 'traffic' (layer3/4) and alert/block for the content (layer7)

 

To build a good web browsing policy, you should make a rule that allows traffic from trust to untrust, and has a url filtering profile that is configured to allow and block certain URL categories

In your traffic log this rule will always be 'allow', in your url filtering log this rule will sometimes be 'alert' and sometimes 'block'

 

 

by default any security rule that is set to deny or drop, will discard a session at a very early stage (oftentimes already discarding the SYN packet) so there is no layer7 inspection performed on these sessions

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization
  • 328 Views
  • 3 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!