URL Category and IP address blocks

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

URL Category and IP address blocks

L1 Bithead

Hi

I have inherited a system with a Custom URL Category that includes URLs and IPs, this is attached to a URL filtering profile that is set to block within a Security Profile Group. 

 

Can IP addresses really be added to a Custom URL Category, or are they simply for URL inspection.?

If so, does the firewall therefore only block the traffic if the IP is part of the URL?

 

Also, I know within Cisco Security Intelligence an FTD has a network policy list to drop early traffic, if an IP exists here, any traffic matching the IP is dropped before it gets to the ACL for further filtering.  Is there an equivalent within Palo Alto to list IPs that any matching traffic is dropped before any Security rule is processed.

Thanks

1 accepted solution

Accepted Solutions

Cyber Elite
Cyber Elite

Hello,

For external access, I dont play IP whack-a-mole. Meaning IP's change too frequently so I go with the dynamic approaches. I use External Dynamic Lists that are built-in to block/allow certain groups etc.

https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/policy/use-an-external-dynamic-list-in-po...

 

Cheers!

View solution in original post

4 REPLIES 4

Cyber Elite
Cyber Elite

Hello,

Not IP's to the URL categories. Could be a separate security policy with the IP's as source or destination. But sounds like you want to block an internal server from internal users? I tend not to do URL filtering inside my network since it can cause issues, etc. What I use is user-id mapping so only users that should have access can even see the site.

Regards,

L1 Bithead

Hi. It is an external access rule for users to access the internet.  In addition to the URL filter Categories, we have another Custom URL list applied to the filtering policy to block URLs

My concern was are IPs meant to be added to a Custom URL Category, is that normal practice.

Thanks

Cyber Elite
Cyber Elite

Hello,

For external access, I dont play IP whack-a-mole. Meaning IP's change too frequently so I go with the dynamic approaches. I use External Dynamic Lists that are built-in to block/allow certain groups etc.

https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/policy/use-an-external-dynamic-list-in-po...

 

Cheers!

Hi, good point, the EDL is the approach I will use going forward for these IP blocks.

Thanks

  • 1 accepted solution
  • 2765 Views
  • 4 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!