PAN9 EDU210 Lab 6
PAN9 EDU210 Lab 6
PAN9 EDU210 Lab 6
NETLAB Academy Edition, NETLAB Professional Edition, and NETLAB+ are registered trademarks of Network Development Group, Inc.
Palo Alto Networks and the Palo Alto Networks logo are trademarks or registered trademarks of Palo Alto Networks, Inc.
Lab 6: URL Filtering
Contents
Introduction ........................................................................................................................ 3
Objectives............................................................................................................................ 3
Lab Topology....................................................................................................................... 4
Lab Settings ......................................................................................................................... 5
1 Content-ID................................................................................................................... 5
1.0 Load Lab Configuration ........................................................................................ 6
1.1 Create a Security Policy Rule with a Custom URL Category................................. 8
1.2 Test Security Policy Rule..................................................................................... 14
1.3 Review the Logs.................................................................................................. 15
1.4 Configure an External Dynamic List ................................................................... 17
1.5 Test the Security Policy Rule .............................................................................. 21
1.6 Review the Logs.................................................................................................. 22
1.7 Create a Security Policy Rule with a URL Filtering Profile.................................. 23
1.8 Test Security Policy Rule with a URL Filtering Profile ........................................ 28
1.9 Review Logs ........................................................................................................ 29
Introduction
The company has security policies in place that scan for spyware, malware, viruses,
vulnerabilities, and file blocking. Now, the company would like to implement URL
filtering. You are needed to create profiles that will meet the requirements of the
company’s internet usage policy.
Objectives
Create a custom URL category and use it as a Security policy rule match criterion
and as part of a URL Filtering Profile
Configure and use an External Dynamic List as a URL block list
Create a URL Filtering Profile and observe the difference between using url-
categories in a Security policy versus a profile
Review firewall log entries to identify all actions and changes
Lab Topology
Lab Settings
The information in the table below will be needed in order to complete the lab. The
task sections below provide details on the use of this information.
1 Content-ID
1.0 Load Lab Configuration
1. Launch the Client virtual machine to access the graphical login screen.
To launch the console window for a virtual machine, you may access by
either clicking on the machine’s graphic image from the topology page
or by clicking on the machine’s respective tab from the navigation bar.
2. Click within the splash screen to bring up the login screen. Log in as lab-user using
the password Pal0Alt0.
Parameter Value
Name admin
Password admin
8. Click the drop-down list next to the Name text box and select edu-210-lab-06. Click
OK.
9. Click Close.
10. Click the Commit link at the top-right of the web interface.
11. Click Commit and wait until the commit process is complete.
13. Leave the firewall web interface open to continue with the next task.
Use a custom URL Category object to create your custom list of URLs and use it in a URL
Filtering Profile or as match criteria in Security Policy rules. In a custom URL Category,
you can add URL entries individually, or import a text file that contains a list of URLs.
3. In the Custom URL Category window, configure the following and click OK.
Parameter Value
6. In the Security Policy Rule window, configure the following under the General tab:
Parameter Value
Name Rename the policy to egress-outside-url
Audit Comment Type Created URL Security policy on <date> by
admin
Parameter Value
Applications Verify that the Any checkbox is selected
Parameter Value
URL Category Click Add and select news-sites from the drop-down
list
9. Click the Actions tab and configure the following; once finished, click OK.
Parameter Value
Action Setting Select Reset both client and server from the drop-
down list
Log Setting Verify that Log at Session End is selected
Profile Setting Select None from the drop-down list
10. Hover over the Name column and click the down-arrow. Expand the Columns menu
using the right-arrow and select the URL Category checkbox. The URL Category
column is displayed.
11. Select the egress-outside security policy rule without opening it and click Enable.
Because you created a rule that resets traffic, you need to enable the
egress-outside rule to allow everything else.
3. Notice that the firewall adds (rule eq ‘egress-outside-url’) to the Traffic log filter text
box. Click the down-arrow on any column header to add the URL Category column
to the Traffic log display (when the list appears, scroll down to locate URL Category).
5. In the web interface, select Monitor > Logs > URL Filtering.
6. Notice that the URL Filtering log includes the Category and URL columns by default.
3. Locate the text file in the right pane named block-list.txt. Right-click on it and select
Edit.
4. Verify that the following URLs exist, each followed by a line break.
9. In the External Dynamic Lists window, configure the following. Once finished, click
OK.
Parameter Value
Name Type url-block-list
Type Select URL List from the drop-down list
Source Type http://192.168.50.10/block-list.txt
Check for updates Select Five Minute from the drop-down list
12. In the Security Policy Rule window, click the Service/URL Category tab and configure
the following. Once finished, click OK.
Parameter Value
URL Category Click Add and select url-block-list from the drop-down
list
3. In the same browser window, verify that gizmodo.com and lifehacker.com also
are blocked.
1. Change focus back to the firewall’s web interface and navigate to Monitor > Logs >
URL Filtering.
2. Notice that the Category column should display the name of the EDL you created,
and the Action column shows that the URL is blocked.
3. Leave the firewall web interface open to continue with the next task.
1. In the web interface, navigate to Objects > Security Profiles > URL Filtering.
Parameter Value
Name Type lab-url-filtering
Description Type Block shopping, government, and hacking
websites
4. Make sure that the Categories tab is selected and locate the shopping category by
scrolling down the list. Set the Site Access to block. Notice that the User Credential
Submission also will change to block once you click away. Click OK.
Do not use the Category search field when configuring these settings,
instead, manually find the categories in the list. Also, these settings
need to be configured one at a time.
5. Click on lab-url-filtering to configure the profile. Make sure that the Categories tab
is selected and locate the government category by scrolling down the list. Set the
Site Access to block. Notice that the User Credential Submission also will change to
block once you click away. Click OK.
6. Click on lab-url-filtering to configure the profile. Make sure that the Categories tab
is selected and locate the hacking category by scrolling down the list. Set the Site
Access to block. Notice that the User Credential Submission also will change to block
once you click away. Click OK.
10. In the Security Policy Rule window, click the Service/URL Category tab and then
select Any above the URL Category list.
11. Click the Actions tab and configure the following. Once finished, click OK.
Parameter Value
Action Select Allow from the drop-down list
Profile Type Select Profiles from the drop-down list
URL Filtering Select lab-url-filtering from the drop-down list
12. Select the egress-outside rule without opening it and click Disable.
You can disable the egress-outside rule because the URL Filtering
Profile is being used and the egress-outside-url Security policy rule now
allows traffic.
1. Open the Internet Explorer browser in private/incognito mode and verify that
http://transportation.gov (government), http://2600.org (hacking) are
blocked.
1. Change focus to the firewall’s web interface and navigate to Monitor > Logs > URL
Filtering.
2. Review the actions taken on the following entries: