Cloud Managed
Focus
Focus
Network Security

Cloud Managed

Table of Contents


Cloud Managed

Block or allow traffic based on IP addresses or URLs in an external dynamic list, or use a dynamic domain list with a DNS sinkhole to prevent access to malicious domains.
Block or allow traffic based on IP addresses or URLs in an external dynamic list, or use a dynamic domain list with a DNS sinkhole to prevent access to malicious domains.
Tips for enforcing policy with external dynamic lists:
  • Search for a domain, IP address, or URL that belongs to one or more external dynamic lists is used in policy. This is useful for determining which external dynamic list (referenced in a Security rule) is causing a certain domain, IP address, or URL to be blocked or allowed.
  • Use an External Dynamic List of Type URL as Match Criteria in a Security Security Rule.
    1. Select
      Manage
      Configuration
      NGFW and
      Prisma Access
      Security Services
      Security Policy
      .
    2. Select
      Add Rule
      and enter a descriptive
      Name
      for the rule.
    3. In
      SOURCE
      , select a
      Zone
      .
    4. In
      DESTINATION
      , select a
      Zone
      .
    5. In
      URL CATEGORY / TENANT RESTRICTION
      , select the appropriate external dynamic list from the URL Category list.
    6. In
      Actions
      , set the
      Action
      setting to
      Allow
      or
      Deny
      .
    7. Select
      Save
      .
    8. Verify whether entries in the external dynamic list were ignored or skipped.
    9. Test that the policy action is enforced.
      1. View External Dynamic List Entries for the URL list, and attempt to access a URL from the list.
      2. Verify that the action you defined is enforced.
      3. Monitor activity. Select
        Incidents & Alerts
        Log Viewer
        Firewall/URL
        to access the detailed log view.
  • Use an IP External Dynamic List or Predefined IP External Dynamic List as a Source or Destination Address Object in a Security Rule.
    This capability is useful if you deploy new servers and want to allow access to the newly deployed servers without requiring a commit.
    1. Select
      Manage
      Configuration
      NGFW and
      Prisma Access
      Security Services
      Security Policy
      .
    2. Select
      Add Rule
      and give the rule a descriptive
      Name
      .
    3. In
      SOURCE
      and
      DESTINATION
      , set the external dynamic list to be used as the
      SOURCE
      and
      DESTINATION
      addresses.
    4. In
      APPLICATION / SERVICE
      , make sure the
      Service
      is set to
      Application Default
      .
    5. In
      Actions
      set the
      Action
      setting to
      Allow
      or
      Deny
      .
      Create separate external dynamic lists if you want to specify allow and deny actions for specific IP addresses.
    6. Leave all the other options at the default values.
    7. Select
      Save
      to save the changes.
    8. Test that the policy action is enforced.
      1. View External Dynamic List Entries for the external dynamic list, and attempt to access an IP address from the list.
      2. Verify that the action you defined is enforced.
      3. Select
        Incidents & Alerts
        Log Viewer
        Firewall/Traffic
        and view the log entry for the session.
  • Use a Predefined URL External Dynamic List to exclude benign domains that applications use for background traffic from Authentication policy.
    When you select the
    panw-auth-portal-exclude-list
    EDL type, you can easily exclude from Authentication policy enforcement the domains that many applications use for background traffic, such as updates and other trusted services. This ensures that the necessary traffic for these services is not blocked and application maintenance is not interrupted.
    1. Select
      Manage
      Configuration
      NGFW and
      Prisma Access
      Identity Services
      Authentication
      Authentication Rules
      Add Rule
      .
    2. In
      Services and URLs
      , select the Predefined URL EDL as the
      URL Category
      .
    3. In
      Action
      , select
      Do Not Authenticate
      .
    4. Select
      Save
      .
    5. Move
      the rule to the top so that it's the first rule in the policy.


Recommended For You