After you enable this feature, the firewall appends a trailing
slash to domain entries (example.com) that
do not end in a trailing slash or asterisk (*). The trailing slash
in non-wildcard domain entries limits matches to the given domain
and its subdirectories. For example, example.com (example.com/ after
processing) matches itself and example.com/search.
The
trailing slash in wildcard domain entries (entries using asterisks
or carets) limits matches to URLs that conform to the specified
pattern. For example, to match the entry *.example.com,
a URL must strictly begin with one or more subdomains and
end with the root domain, example.com; news.example.com is
a match, but example.com is not because it
lacks a subdomain.
Use the following CLI commands to enable
this feature:
admin@PA-850> debug device-server append-end-token on
admin@PA-850> configure
admin@PA-850# commit
To
disable this feature:
admin@PA-850> debug device-server append-end-token off
admin@PA-850> configure
admin@PA-850# commit
We
recommend manually adding trailing slashes to clarify the intended
matching behavior of an entry for anyone who inspects your URL list.
The trailing slash is invisible if added by the firewall.
URL Category Exceptions (PAN-OS
10.2) discusses the trailing slash and matching behavior when this
feature is enabled.
You have to enable this feature
on each firewall running PAN-OS® 10.1 or earlier. Panorama™
management servers running PAN-OS 10.2 cannot enable this feature
for firewalls running PAN-OS 10.1 or earlier.