Table of Contents

URL Filtering - Override

Override Overview

I have been unable to get the Continue/Override pages working properly on Palo Alto Networks when set to transparent mode under Device→Setup→Content-ID→URL Admin Override. I have also been unable to get it working with loopback interfaces. I suspect the latter issue should be fixable as it implies that the administrator would be limited to response pages on one link only (and that seems crazy).

Under Device→Setup→Content-ID→URL Admin Override, the is a field called “Address” where you can put either the IP address OR FQND of the interface being used on the firewall for response pages. What you put affects the restrictions on certificate creation that are detailed below.

Here are some notes I made on getting the Continue/Override functionality to work properly for Response Page redirects.

To enable Firefox (v49+) to use Windows Certificate Store, run the following steps

  1. Type about:config in Firefox's address bar (click through any warnings).
  2. Right click and create a new boolean value. Enter (as the name) security.enterprise_roots.enabled.
  3. Set the value to true.

Certificates

If found that Firefox (58), Chrome (64) and Internet Explorer (11) all behaved differently to certificates that I created. The table below shows what happens when using combinations of the “Common Name” field and the “hostname” and “IP” fields of the “Certificate Attributes”. I have split the results into two. The first are when I used and IP as an address in Device→Setup→Content-ID→URL Admin Override→Address field. The second is when I used a FQDN in the Device→Setup→Content-ID→URL Admin Override→Address field.

In summary:

In the example below, I either set the Address field to 10.1.1.1 or to rsp.example.com. When you see bad.example.com, that is a test to see how the browser reacts to a different FQDN being used.

URL Admin Override→Address Common Name Hostname IP Firefox (58) Chrome (64) IE (11) All
10.1.1.1 10.1.1.1 Works Fails Works Fails
10.1.1.1 10.1.1.1 10.1.1.1 Works Works Works Works
10.1.1.1 10.1.1.1 10.1.1.1 Fails Fails Works Fails
10.1.1.1 10.1.1.1 10.1.1.1 10.1.1.1 Works Works Works Works
10.1.1.1 10.1.1.1:6083 Fails Fails Fails Fails
10.1.1.1 10.1.1.1:6083 10.1.1.1 Works Works Fails Fails
10.1.1.1 10.1.1.1:6083 10.1.1.1 Fails Fails Works Fails
10.1.1.1 10.1.1.1:6083 10.1.1.1 10.1.1.1 Works Works Works Works
10.1.1.1 bad.example.com Fails Fails Fails Fails
10.1.1.1 bad.example.com Works Works Fails Fails
10.1.1.1 bad.example.com 10.1.1.1 Fails Fails Works Fails
10.1.1.1 bad.example.com 10.1.1.1 10.1.1.1 Fails Fails Fails Fails
rsp.example.local rsp.example.local Works Fails Works Fails
rsp.example.local rsp.example.local 10.1.1.1 Works Fails Works Fails
rsp.example.local rsp.example.local rsp.example.local Works Works Works Works
rsp.example.local rsp.example.local rsp.example.local 10.1.1.1 Works Works Works Works
rsp.example.local rsp.example.local:6083 Fails Fails Fails Fails
rsp.example.local rsp.example.local:6083 10.1.1.1 Fails Fails Fails Fails
rsp.example.local rsp.example.local:6083 rsp.example.local Works Works Works Works
rsp.example.local rsp.example.local:6083 rsp.example.local 10.1.1.1 Works Works Works Works
rsp.example.local bad.example.com Fails Fails Fails Fails
rsp.example.local bad.example.com 10.1.1.1 Fails Fails Fails Fails
rsp.example.local bad.example.com rsp.example.local Works Works Works Works
rsp.example.local bad.example.com rsp.example.local 10.1.1.1 Works Works Works Works