When URL Category is 'any' traffic is getting allowed

When URL Category is 'any' traffic is getting allowed

10934
Created On 03/20/24 11:57 AM - Last Modified 03/20/24 12:51 PM


Symptom


  • URL Category set to any hitting incorrect rule or getting incorrectly allowed
  • Traffic logs shows traffic allowed and session end-reason other than threat


Environment


  • PAN-OS
  • URL Category configured on Security Policy Rules


Cause


There are few occasions when category is any and traffic is allowed
  • URL category any is allowed by design because its a category implicitly defined before the category is identified. This choice has been done by design because if you have configured URL Category match criteria in any of the Rules and there is not a default allow rule all traffic which category is not yet identified will be dropped.
  • If session is logged at start category can be  'any' as its just logging initial data after the 3-way handshake. This means that we need to be concerned about is session type 'end', from traffic log point of view.
  • If identified app-id is ssl category can be 'any' it means that session ended right after the ssl handshake finished. In this case if there is concern about policy matching session needs to be decrypted. If not decrypted app-id can remain ssl , thus firewall has no capability of inspecting http traffic to match right URL category.
  • If identified app-id is incomplete, transaction is incomplete, we do not have meaningful data to analyse so category will be 'any'
  • HTTP2 parent session URL category is 'any'. This can be identified as http2 connection id being 0. For HTTP2 which has connection session and stream session, inside HTTP2 there are multiple streams. In the firewall we treat each stream session as dedicated sessions. 


Resolution


For proper auditing of the logs for Security Policy matching and concern whether traffic is allowed or not:
  • Filter out traffic which is start log session
  • Filter out traffic which application is ssl, incomplete, insufficient
  • Filter out traffic which is ssl and not decrypted
  • Filter out http2 parent sessions

Following filter is good reference to check relevant traffic:

( subtype eq 'end' ) and ( app neq 'ssl' ) and ( flags has proxy ) and ( http2_connection neq '0' )



Additional Information


URL filtering lookup and enforcement differences between clear text HTTP and encrypted HTTPS traffic

Why is Traffic matching incorrect security policy based on custom url category ?



 


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000XhymCAC&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language