{"id":584,"date":"2019-03-27T22:18:32","date_gmt":"2019-03-28T03:18:32","guid":{"rendered":"http:\/\/zewwy.ca\/?p=584"},"modified":"2019-03-28T22:55:53","modified_gmt":"2019-03-29T03:55:53","slug":"pan-url-categories","status":"publish","type":"post","link":"https:\/\/zewwy.ca\/index.php\/2019\/03\/27\/pan-url-categories\/","title":{"rendered":"PAN URL Categories"},"content":{"rendered":"<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"PAN_URL_Categories\"><\/span><strong>PAN URL Categories<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>Heyo! So today I&#8217;m gonna cover URL category&#8217;s. Obviously <a href=\"https:\/\/en.wikipedia.org\/wiki\/URL\">Uniform Resource Locations<\/a> are nothing new and even more so <a href=\"https:\/\/www.dictionary.com\/browse\/categories\">categories<\/a> hahah. So when you know existing ones and have classified them, you can do some amazing things, what&#8217;s the hardest part&#8230;. Yes&#8230; proper classification of every possible URL, near impossible, but with collaboration feasible. In this post I&#8217;m going to cover how to set this up on a Palo Alto Networks firewall, cover some benefits, a couple annoyances, and ways to resolve them when possible&#8230;. Let&#8217;s get started!<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"License_Stuff\"><\/span>License Stuff<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now when I first started with Palo Alto Networks Firewalls, they were using Brightcloud&#8230; here&#8217;s a bit of details <a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/7-1\/pan-os-admin\/url-filtering\/url-filtering-vendors\">from here<\/a><\/p>\n<div class=\"xml_body_2 xml parbase\">\n<div class=\"body\">Palo Alto Networks firewalls support two URL filtering vendors:<\/div>\n<\/div>\n<div class=\"xml_bulletList_3 xml parbase\">\n<div class=\"bulletList\">PAN-DB\u2014A Palo Alto Networks developed URL filtering database that is tightly integrated into PAN-OS and the Palo Alto Networks threat intelligence cloud. PAN-DB provides high-performance local caching for maximum inline performance on URL lookups, and offers coverage against malicious URLs and IP addresses. As WildFire, which is a part of the Palo Alto Networks threat intelligence cloud, identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs), the PAN-DB database is updated with information on malicious URLs so that you can block malware downloads, and disable Command and Control (C2) communications to protect your network from cyber threats.<\/div>\n<\/div>\n<div class=\"xml_bullet-Indent_4 xml parbase\">\n<div class=\"bullet-Indent\"><\/div>\n<\/div>\n<div class=\"xml_bulletList_5 xml parbase\">\n<div class=\"bulletList\">BrightCloud\u2014A third-party URL database that is owned by Webroot, Inc. that is integrated into PAN-OS firewalls. For information on the BrightCloud URL database, visit <a href=\"https:\/\/www.brightcloud.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/brightcloud.com<\/a>.<\/div>\n<\/div>\n<div><\/div>\n<div>I&#8217;m not exactly sure if Brightcloud is going to continued to be supported or not and they have instead stuck more with their own in house URL DB, which of course requires a license so under Device -&gt; Licenses ensure you have an active PAN URL-DB license.<\/div>\n<div><\/div>\n<div>For a list of all the class types you can use <a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000Cm5hCAC\">see here<\/a>. (PAN login required)<\/div>\n<div><\/div>\n<div>Once you get this out of the way lets get into the good stuff.<\/div>\n<div><\/div>\n<div>Still under the Licenses area, Click the Download Now link under the area.<\/div>\n<div><\/div>\n<div><a href=\"https:\/\/i.imgur.com\/QO1yj3O.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/QO1yj3O.png\" alt=\"\" width=\"374\" height=\"141\" \/><\/a><\/div>\n<div><a href=\"https:\/\/i.imgur.com\/asqS16t.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/asqS16t.png\" alt=\"\" width=\"577\" height=\"156\" \/><\/a><\/div>\n<div><\/div>\n<div>Considering I have nothing&#8230; Yes&#8230;<\/div>\n<div><\/div>\n<div><a href=\"https:\/\/i.imgur.com\/HJkBbUj.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/HJkBbUj.png\" alt=\"\" width=\"402\" height=\"151\" \/><\/a><\/div>\n<div><\/div>\n<div>Not sure why they have a region selection&#8230; but alright&#8230;<\/div>\n<div><\/div>\n<div><a href=\"https:\/\/i.imgur.com\/2PGBcg5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/2PGBcg5.png\" alt=\"\" width=\"401\" height=\"170\" \/><\/a><\/div>\n<div>Yay!<\/div>\n<div><\/div>\n<div><a href=\"https:\/\/i.imgur.com\/OcJkKAq.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/OcJkKAq.png\" alt=\"\" width=\"520\" height=\"140\" \/><\/a><\/div>\n<div>Now we are ready to start using them!<\/div>\n<div><\/div>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Objective_Profiles%E2%80%A6_I_mean_Object_Profiles\"><\/span>Objective Profiles&#8230; I mean Object Profiles<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Yeah&#8230; click on the Objects tab&#8230; look under Security Profiles&#8230; URL Filtering.<\/p>\n<p>There lies a default profile, which allows 57 categories while blocking only 9. For a simple test I&#8217;ll use this, the blocked categories are:<\/p>\n<ol>\n<li>abused-drugs (LOL, cause other poisons like Tobacco and alcohol are allowed, cause laws)<\/li>\n<li>adult (I&#8217;m assuming this is a business friendly term for porn)<\/li>\n<li>command-and-control (duh)<\/li>\n<li>gambling (duh)<\/li>\n<li>hacking (interesting class definition)<\/li>\n<li>malware (duh)<\/li>\n<li>phishing (duh)<\/li>\n<li>questionable (duh)<\/li>\n<li>weapons (awwwww)<\/li>\n<\/ol>\n<p>Well that seems like a fairly reasonable list. Creating your own allow and block listing is just as easy as creating a new profile and defining each class accordingly, and yes you can easily clone an existing profile and change one or two categories as required.<\/p>\n<p>The Allow and Block lists are specified under the overrides areas if you happen to need to allow or block a URL before it can be officially re-classed by PAN DB. As quoted by the wizard, &#8220;For the block list and allow list enter one entry per row, separating the rows with a newline. Each entry should be in the form of &#8220;www.example.com&#8221; and without quotes or an IP address (http:\/\/ or https:\/\/ should not be included). Use separators to specify match criteria &#8211; for example, &#8220;www.example.com\/&#8221; will match &#8220;www.example.com\/test&#8221; but not match &#8220;www.example.com.hk&#8221;&#8221; Which makes sense it&#8217;s will determine what is allowed as for proctols under the security rules area, this simply states which addresses (DNS or IP based) to allow or block. In the case of DNS till proper classification.<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Checking_a_URL_for_a_Category\"><\/span>Checking a URL for a Category<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>To check a address class, check PANs site for <a href=\"https:\/\/urlfiltering.paloaltonetworks.com\/\">it here<\/a>. If you find a site is mis-classed you can send an email to Palo Alto Networks team and they will test the verification of the re-class and re-class the PAN DB accordingly. As far as I can tell I don&#8217;t think this one actually requires a login.<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Using_IT\"><\/span>Using IT!<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Alright, alright, lets actually get to some uses. Now if you were following my series see my last two posts <a href=\"http:\/\/zewwy.ca\/index.php\/2019\/03\/23\/setting-up-a-palo-alto-networks-vm-50\/\">here<\/a>, and <a href=\"http:\/\/zewwy.ca\/index.php\/2019\/03\/26\/basic-setup-of-a-pan-vm-50\/\">here<\/a> for reference material. Under the Security Rule Test Internet, the final tab, actions, we did not define any profile settings, this is where the rubber hits the road for the first time.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/KsPTTrA.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/KsPTTrA.png\" alt=\"\" width=\"701\" height=\"357\" \/><\/a><\/p>\n<p>Pick Profiles, We&#8217;ll cover groups a bit later (its just a group of profiles, who&#8217;d of thought).<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/93lhmKC.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/93lhmKC.png\" alt=\"\" width=\"698\" height=\"492\" \/><\/a><\/p>\n<p>As you can see this expands the window to show all the profiles you saw under the Objects -&gt; Security Profiles area, in this case we are just going to play with the URL filtering.<\/p>\n<p>Now once I apply this on the internet rule.. productive for my Test XP machine should go up&#8230; muahahah and&#8230;<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/raOr122.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/raOr122.png\" alt=\"\" width=\"1176\" height=\"656\" \/><\/a><\/p>\n<p>HAHAHAHA you lazy mid 2000&#8217;s virtual worker&#8230; you can&#8217;t go gambling get back to work!<\/p>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>As you can see how useful URL categories can be, unfortunately I did want to cover more granular examples; such as only allowing a server to access it&#8217;s known update server URL&#8217;s. Hopefully I can update this post to cover that as well.<\/p>\n<p>For now I hope you enjoyed this quick blog post. In my next post I hope to cover how this isn&#8217;t an IDS of any kind at this point, but a single layer of the multi-layer security onion. Stay tuned for more. \ud83d\ude42<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PAN URL Categories Heyo! So today I&#8217;m gonna cover URL category&#8217;s. Obviously Uniform Resource Locations are nothing new and even more so categories hahah. So when you know existing ones and have classified them, you can do some amazing things, what&#8217;s the hardest part&#8230;. Yes&#8230; proper classification of every possible URL, near impossible, but with &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/zewwy.ca\/index.php\/2019\/03\/27\/pan-url-categories\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;PAN URL Categories&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[4,6,127,8],"tags":[177,176,183],"class_list":["post-584","post","type-post","status-publish","format-standard","hentry","category-infosec","category-networking","category-palo-alto-networks","category-server-administration","tag-pan-os","tag-pan-vm-50","tag-url-categories"],"_links":{"self":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/comments?post=584"}],"version-history":[{"count":5,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/584\/revisions"}],"predecessor-version":[{"id":591,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/584\/revisions\/591"}],"wp:attachment":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/media?parent=584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/categories?post=584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/tags?post=584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}