How to narrow the scope of a Threat Exception using cloned Security Policy rules and Security Profiles
4562
Created On 04/30/21 13:56 PM - Last Modified 09/19/23 11:17 AM
Objective
To provide a more granular approach to applying threat exceptions by narrowing the scope of the applied exception.
Environment
- Palo Alto Firewall
- PAN-OS
Procedure
- Identify the existing Security Policy rule and associated Security Profile you want to apply the threat exception.
- Clone the existing Security Policy rule. Rename the cloned Security Policy rule and placed right above the existing policy rule.
- Narrow the scope of the cloned Security Policy rule to the traffic desired.
- Clone and rename the associated Security Profile.
- Create the desired Threat Exceptions to the cloned Security Profile.
- Associate the cloned Security Profile to the cloned Security Policy rule.
7. Commit your changes.
Following these steps will allow the desired traffic to hit the new cloned policy rule and new Security Profile with the exception while the other traffic not in the scope will still hit the existing rule without the exception.
Additional Information
For more details, please see these additional articles on creating threat exceptions:
How to Use Anti-Spyware, Vulnerability and Antivirus Exceptions to Block or Allow Threats