User Tools

Site Tools


paloaltonetworks:configuration:url_override

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
paloaltonetworks:configuration:url_override [2020/05/22 09:43] bstaffordpaloaltonetworks:configuration:url_override [2022/11/23 12:49] (current) – external edit 127.0.0.1
Line 4: Line 4:
  
  
-Under ''Device->Setup->Content-ID->URL Admin Override'', the is a field called //Address// where you can put either the IP address OR FQND of the interface being used on the firewall for response pages. What you put affects the restrictions on certificate creation that are detailed below.+Under ''Device->Setup->Content-ID->URL Admin Override'', the is a field called "Addresswhere you can put either the IP address OR FQND of the interface being used on the firewall for response pages. What you put affects the restrictions on certificate creation that are detailed below.
  
  
Line 10: Line 10:
   * For Firefox 58, I found that if I created a root CA on the firewall and used it as the response page, Firefox threw an error even after I imported it as a trusted CA. The solution was to generate the CA root on the firewall and use that to create a trusted certificate for response pages.   * For Firefox 58, I found that if I created a root CA on the firewall and used it as the response page, Firefox threw an error even after I imported it as a trusted CA. The solution was to generate the CA root on the firewall and use that to create a trusted certificate for response pages.
   * The response page certificate does not have to be a CA or Subordinate-CA certificate.   * The response page certificate does not have to be a CA or Subordinate-CA certificate.
-  * While the response page certificate does not need to be a CA or Subordinate-CA certificate, you do require a CA or Subordinate-CA certificate present on the Palo that is marked as //Forward Trust Certificate// if you are going to intercept SSL pages correctly. You don't need decryption rules in place, just the Forward Trust Certificate (which is a Trusted Root Authority by all the endpoints using the Palo firewall. Don't forget that Firefox uses its own certificate store).+  * While the response page certificate does not need to be a CA or Subordinate-CA certificate, you do require a CA or Subordinate-CA certificate present on the Palo that is marked as 'Forward Trust Certificateif you are going to intercept SSL pages correctly. You don't need decryption rules in place, just the Forward Trust Certificate (which is a Trusted Root Authority by all the endpoints using the Palo firewall. Don't forget that Firefox uses its own certificate store).
   * You will have to run the following on the Palo firewall CLI (this will automatically sync to a HA partner if there is one so you only have to run this command on one firewall in a pair).''set deviceconfig setting ssl-decrypt url-proxy yes''   * You will have to run the following on the Palo firewall CLI (this will automatically sync to a HA partner if there is one so you only have to run this command on one firewall in a pair).''set deviceconfig setting ssl-decrypt url-proxy yes''
-  * The firewall will not let us add a hostname in the "Certificate Attributes" section that has a port number attached. However, the Common Name field will accept a port number after the IP (e.g. ''1.1.1.1:443''+  * The firewall will not let us add a hostname in the "Certificate Attributes" section that has a port number attached. However, the Common Name field will accept a port number after the IP (e.g. 1.1.1.1:443) 
-  * Even when the firewall is configured correctly, you will find that several sites will still not be intercepted correctly (e.g. ''google.com''''facebook.com''''twitter.com'', etc). Firefox (58) will helpfully figure out what is happening and prompt you with a "Open Network Portal page" button that will take you to the response page (thinking it is a guest wifi captive portal page). Google Chrome isn't so helpful and will just display an error. This is due to Google preloading HSTS certificate information into the Chrome executable. Internet Explorer seems similar to Chrome.+  * Even when the firewall is configured correctly, you will find that several sites will still not be intercepted correctly (e.g. google.com, facebook.com, twitter.com, etc). Firefox (58) will helpfully figure out what is happening and prompt you with a "Open Network Portal page" button that will take you to the response page (thinking it is a guest wifi captive portal page). Google Chrome isn't so helpful and will just display an error. This is due to Google preloading HSTS certificate information into the Chrome executable. Internet Explorer seems similar to Chrome.
   * When using ''rsp.example.local'' as the address in ''Device->Setup->Content-ID->URL Admin Override'', nothing worked when using on IP information.   * When using ''rsp.example.local'' as the address in ''Device->Setup->Content-ID->URL Admin Override'', nothing worked when using on IP information.
  
Line 22: Line 22:
  
 =====Certificates=====  =====Certificates===== 
-If found that Firefox (58), Chrome (64) and Internet Explorer (11) all behaved differently to certificates that I created. The table below shows what happens when using combinations of the //Common Name// field and the //hostname// and //IP// fields of the //Certificate Attributes//. I have split the results into two. The first are when I used and IP as an address in ''Device->Setup->Content-ID->URL Admin Override->Address field''. The second is when I used a FQDN in the ''Device->Setup->Content-ID->URL Admin Override->Address field''.+If found that Firefox (58), Chrome (64) and Internet Explorer (11) all behaved differently to certificates that I created. The table below shows what happens when using combinations of the "Common Namefield and the "hostnameand "IPfields of the "Certificate Attributes". I have split the results into two. The first are when I used and IP as an address in Device->Setup->Content-ID->URL Admin Override->Address field. The second is when I used a FQDN in the Device->Setup->Content-ID->URL Admin Override->Address field.
  
  
Line 29: Line 29:
   * If you use a FQDN in ''Device->Setup->Content-ID->URL Admin Override->Address field'', then you need the FQDN in the ''hostname'' field. The //Common Name// didn't actually seem important.   * If you use a FQDN in ''Device->Setup->Content-ID->URL Admin Override->Address field'', then you need the FQDN in the ''hostname'' field. The //Common Name// didn't actually seem important.
  
-In the example below, I either set the Address field to ''10.1.1.1'' or to ''rsp.example.com''. When you see ''bad.example.com'', that is a test to see how the browser reacts to a different FQDN being used.+In the example below, I either set the Address field to ''10.1.1.1'' or to ''rsp.example.com''. When you see bad.example.com, that is a test to see how the browser reacts to a different FQDN being used. 
 + 
 + 
 +^ URL Admin Override->Address ^ Common Name ^ Hostname ^ IP ^ Firefox (58) ^ Chrome (64) ^ IE (11)  ^ All ^ 
 +| 10.1.1.1 | 10.1.1.1 |  |  | Works | Fails | Works | Fails |  
 +| 10.1.1.1 | 10.1.1.1 |  | 10.1.1.1 | Works | Works | Works | Works |  
 +| 10.1.1.1 | 10.1.1.1 | 10.1.1.1 |  | Fails | Fails | Works | Fails |  
 +| 10.1.1.1 | 10.1.1.1 | 10.1.1.1 | 10.1.1.1 | Works | Works | Works | Works |  
 +| 10.1.1.1 | 10.1.1.1:6083 |  |  | Fails | Fails | Fails | Fails |  
 +| 10.1.1.1 | 10.1.1.1:6083 |  | 10.1.1.1 | Works | Works | Fails | Fails |  
 +| 10.1.1.1 | 10.1.1.1:6083 | 10.1.1.1 |  | Fails | Fails | Works | Fails |  
 +| 10.1.1.1 | 10.1.1.1:6083 | 10.1.1.1 | 10.1.1.1 | Works | Works | Works | Works |  
 +| 10.1.1.1 | bad.example.com |  |  | Fails | Fails | Fails | Fails |  
 +| 10.1.1.1 | bad.example.com |  |  | Works | Works | Fails | Fails |  
 +| 10.1.1.1 | bad.example.com | 10.1.1.1 |  | Fails | Fails | Works | Fails |  
 +| 10.1.1.1 | bad.example.com | 10.1.1.1 | 10.1.1.1 | Fails | Fails | Fails | Fails |  
 +| rsp.example.local | rsp.example.local |  |  | Works | Fails | Works | Fails |  
 +| rsp.example.local | rsp.example.local |  | 10.1.1.1 | Works | Fails | Works | Fails |  
 +| rsp.example.local | rsp.example.local | rsp.example.local |  | Works | Works | Works | Works |  
 +| rsp.example.local | rsp.example.local | rsp.example.local | 10.1.1.1 | Works | Works | Works | Works |  
 +| rsp.example.local | rsp.example.local:6083 |  |  | Fails | Fails | Fails | Fails |  
 +| rsp.example.local | rsp.example.local:6083 |  | 10.1.1.1 | Fails | Fails | Fails | Fails |  
 +| rsp.example.local | rsp.example.local:6083 | rsp.example.local |  | Works | Works | Works | Works |  
 +| rsp.example.local | rsp.example.local:6083 | rsp.example.local | 10.1.1.1 | Works | Works | Works | Works |  
 +| rsp.example.local | bad.example.com |  |  | Fails | Fails | Fails | Fails |  
 +| rsp.example.local | bad.example.com |  | 10.1.1.1 | Fails | Fails | Fails | Fails |  
 +| rsp.example.local | bad.example.com | rsp.example.local |  | Works | Works | Works | Works |  
 +| rsp.example.local | bad.example.com | rsp.example.local | 10.1.1.1 | Works | Works | Works | Works |  
  
paloaltonetworks/configuration/url_override.1590140599.txt.gz · Last modified: (external edit)