paloaltonetworks:configuration:url_override
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| paloaltonetworks:configuration:url_override [2020/05/22 09:43] – bstafford | paloaltonetworks:configuration:url_override [2022/11/23 12:49] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 4: | Line 4: | ||
| - | Under '' | + | Under '' |
| Line 10: | Line 10: | ||
| * For Firefox 58, I found that if I created a root CA on the firewall and used it as the response page, Firefox threw an error even after I imported it as a trusted CA. The solution was to generate the CA root on the firewall and use that to create a trusted certificate for response pages. | * For Firefox 58, I found that if I created a root CA on the firewall and used it as the response page, Firefox threw an error even after I imported it as a trusted CA. The solution was to generate the CA root on the firewall and use that to create a trusted certificate for response pages. | ||
| * The response page certificate does not have to be a CA or Subordinate-CA certificate. | * The response page certificate does not have to be a CA or Subordinate-CA certificate. | ||
| - | * While the response page certificate does not need to be a CA or Subordinate-CA certificate, | + | * While the response page certificate does not need to be a CA or Subordinate-CA certificate, |
| * You will have to run the following on the Palo firewall CLI (this will automatically sync to a HA partner if there is one so you only have to run this command on one firewall in a pair).'' | * You will have to run the following on the Palo firewall CLI (this will automatically sync to a HA partner if there is one so you only have to run this command on one firewall in a pair).'' | ||
| - | * The firewall will not let us add a hostname in the " | + | * The firewall will not let us add a hostname in the " |
| - | * Even when the firewall is configured correctly, you will find that several sites will still not be intercepted correctly (e.g. '' | + | * Even when the firewall is configured correctly, you will find that several sites will still not be intercepted correctly (e.g. google.com, facebook.com, |
| * When using '' | * When using '' | ||
| Line 22: | Line 22: | ||
| =====Certificates===== | =====Certificates===== | ||
| - | If found that Firefox (58), Chrome (64) and Internet Explorer (11) all behaved differently to certificates that I created. The table below shows what happens when using combinations of the //Common Name// field and the //hostname// and //IP// fields of the //Certificate Attributes//. I have split the results into two. The first are when I used and IP as an address in '' | + | If found that Firefox (58), Chrome (64) and Internet Explorer (11) all behaved differently to certificates that I created. The table below shows what happens when using combinations of the "Common Name" |
| Line 29: | Line 29: | ||
| * If you use a FQDN in '' | * If you use a FQDN in '' | ||
| - | In the example below, I either set the Address field to '' | + | In the example below, I either set the Address field to '' |
| + | |||
| + | |||
| + | ^ URL Admin Override-> | ||
| + | | 10.1.1.1 | 10.1.1.1 | | | Works | Fails | Works | Fails | | ||
| + | | 10.1.1.1 | 10.1.1.1 | | 10.1.1.1 | Works | Works | Works | Works | | ||
| + | | 10.1.1.1 | 10.1.1.1 | 10.1.1.1 | | Fails | Fails | Works | Fails | | ||
| + | | 10.1.1.1 | 10.1.1.1 | 10.1.1.1 | 10.1.1.1 | Works | Works | Works | Works | | ||
| + | | 10.1.1.1 | 10.1.1.1: | ||
| + | | 10.1.1.1 | 10.1.1.1: | ||
| + | | 10.1.1.1 | 10.1.1.1: | ||
| + | | 10.1.1.1 | 10.1.1.1: | ||
| + | | 10.1.1.1 | bad.example.com | | | Fails | Fails | Fails | Fails | | ||
| + | | 10.1.1.1 | bad.example.com | | | Works | Works | Fails | Fails | | ||
| + | | 10.1.1.1 | bad.example.com | 10.1.1.1 | | Fails | Fails | Works | Fails | | ||
| + | | 10.1.1.1 | bad.example.com | 10.1.1.1 | 10.1.1.1 | Fails | Fails | Fails | Fails | | ||
| + | | rsp.example.local | rsp.example.local | | | Works | Fails | Works | Fails | | ||
| + | | rsp.example.local | rsp.example.local | | 10.1.1.1 | Works | Fails | Works | Fails | | ||
| + | | rsp.example.local | rsp.example.local | rsp.example.local | | Works | Works | Works | Works | | ||
| + | | rsp.example.local | rsp.example.local | rsp.example.local | 10.1.1.1 | Works | Works | Works | Works | | ||
| + | | rsp.example.local | rsp.example.local: | ||
| + | | rsp.example.local | rsp.example.local: | ||
| + | | rsp.example.local | rsp.example.local: | ||
| + | | rsp.example.local | rsp.example.local: | ||
| + | | rsp.example.local | bad.example.com | | | Fails | Fails | Fails | Fails | | ||
| + | | rsp.example.local | bad.example.com | | 10.1.1.1 | Fails | Fails | Fails | Fails | | ||
| + | | rsp.example.local | bad.example.com | rsp.example.local | | Works | Works | Works | Works | | ||
| + | | rsp.example.local | bad.example.com | rsp.example.local | 10.1.1.1 | Works | Works | Works | Works | | ||
paloaltonetworks/configuration/url_override.1590140599.txt.gz · Last modified: (external edit)
