Lab 7 Blocking Threats From Known-Bad Sources
Lab 7 Blocking Threats From Known-Bad Sources
Lab 7 Blocking Threats From Known-Bad Sources
Palo Alto Networks and the Palo Alto Networks logo are trademarks or registered trademarks of Palo Alto Networks, Inc.
Lab 7: Blocking Threats from Known-Bad Sources
Contents
Introduction ................................................................................................................................................ 3
Objective ..................................................................................................................................................... 3
Lab Topology ............................................................................................................................................... 4
Lab Settings ................................................................................................................................................. 5
7 Block Threats from Known-Bad Sources............................................................................................. 6
7.1 Apply a Baseline Configuration to the Firewall ........................................................................... 6
7.2 Test Access to Know Malicious IP Addresses ............................................................................ 11
7.3 Block Access to Malicious IP Addresses Using Address Objects ............................................... 14
7.4 Block Access to Malicious IP Addresses Using Address Groups ................................................ 23
7.5 Block Access to Malicious IP Addresses by Geographic Region ................................................ 29
7.6 Block Access to Malicious IP Addresses Using EDLs .................................................................. 33
7.7 Block Access to Malicious Domains Using an EDL ..................................................................... 44
7.8 Add the Domain List EDL to an Anti-Spyware Profile ................................................................ 48
7.9 Add the Anti-Spyware Profile to a Security Policy Rule ............................................................ 51
7.10 Block Access to Malicious URLs Using the Security Policy ...................................................... 55
7.11 Create a Custom URL Category ............................................................................................... 64
7.12 Create an EDL to Block Malicious URL Access ......................................................................... 70
7.13 Block Access to a Malicious URL Using a URL Filtering Profile ................................................ 78
Introduction
You need to make certain that the firewall blocks traffic, both to and from known malicious IP
addresses, hostnames, and domain names. There are numerous external blocklists that you may want
to implement on the Palo Alto Networks firewall. You also need to implement your own custom lists of
IP addresses, hostnames, and domain names to block traffic based on various corporate policies.
Upper management is also concerned that some users have been accessing inappropriate web content
from their corporate devices. You need to configure the firewall to block browsing to certain categories
of web traffic, including adult and nudity.
You are concerned about users accessing websites that are often the source of malicious files and
content, such as viruses and spyware.
In this section, you will explore the options available on the firewall that allow you to block individual
addresses, groups of addresses, and lists of addresses. You will also configure the firewall to block
certain categories of websites.
Objective
Lab Topology
Lab Settings
The information in the table below will be needed to complete the lab. The task sections below
provide details on the use of this information.
4. You will see a “Your connection is not private” message. Click on the ADVANCED link.
Before you can enable Telemetry Data Collection, you would need to
install a device certificate. For this lab, you will not be using Telemetry
Data Collection.
8. In the web interface, navigate to Device > Setup > Operations and click on Load named
configuration snapshot underneath the Configuration Management section.
9. In the Load Named Configuration window, select edu-210-lab-07.xml from the Name dropdown
box and click OK.
10. In the Loading Configuration window, a message will show Configuration is being loaded. Please
check the Task Manager for its status. You should reload the page when the task is completed. Click
Close to continue.
11. Click the Tasks icon located at the bottom-right of the web interface.
12. In the Task Manager – All Tasks window, verify the Load type has successfully completed. Click
Close.
13. Click the Commit link located at the top-right of the web interface.
14. In the Commit window, click Commit to proceed with committing the changes.
15. When the Commit operation successfully completes, click Close to continue.
The commit process takes changes made to the Firewall and copies
them to the running configuration, which will activate all configuration
changes since the last commit.
16. Leave the Palo Alto Networks Firewall open and continue to the next task.
You can use security policy rules to block access to known malicious IP addresses. Because the list of
malicious IP addresses can quickly change, you will treat two legitimate IP addresses as though they
are malicious and block access to them.
1. Minimize the Chromium browser by clicking the minimize icon and continue to the next task.
3. Enter the command below to obtain the IP Address of 2600.org. Write down the IP address or copy
and paste it into a text document on the desktop.
4. In the same CMD window, enter the command below. Write down the IP address or copy and
paste it into a text document on the desktop.
5. In the same CMD window, verify connectivity to the websites by entering the commands below.
You will ping two IP Addresses. Use Ctrl+C to stop the ping for the two commands after a few
seconds.
6. Minimize the Terminal window by clicking the minimize icon in the upper-right.
7. If you minimized the firewall, reopen the firewall interface by clicking on the Chromium tab in the
taskbar. Leave the firewall interface open and continue to the next task.
Be aware that the list of malicious IP addresses quickly changes, so keeping your Address objects
current could be problematic. For this reason, later lab exercises will illustrate more automated
methods to block the current list of malicious IP addresses.
In this section, you will create an Address object that contains a list of malicious IP addresses. You will
use this Address object in the security policy to block access to the malicious IP addresses.
Lastly, you will test access to the IP Addresses contained in the Address Objects.
Parameter Value
Name malicious-ip-address-1
Description 2600.org IP address
Type IP Netmask
(address text box) <IP_address_of_2600.org>
Note that the IP address you enter may be different from the previous
example.
Parameter Value
Name malicious-fqdn-1
Description www.breakthesecurity.com
Type FQDN
(FQDN text box) www.breakthesecurity.com
5. Once you click Resolve, you will be prompted to select Use this Address.
8. Select Policies > Security. Click Add to create a new security policy rule.
9. In the Security Policy Rule window, on the General tab, type Block-Known-Bad-IPs as the Name.
For Description, enter Blocks traffic to malicious address objects.
Parameter Value
Source Zone Add Users_Net and Extranet
Source Address Any
Parameter Value
Destination Zone Add Internet
Destination Address Add malicious-fqdn-1 and malicious-ip-address-1
12. Click the Application tab and verify that Any is selected.
13. Click the Service/URL Category tab and verify that application-default and Any are selected.
14. Click the Actions tab and configure the following. Click OK.
Parameter Value
Action Deny
Log Setting Log at Session End
15. Select, but do not open, the Block-Known-Bad-IPs rule in the security policy.
16. At the bottom of the window, select Move > Move Top to move the rule to the top of the security
policy.
18. Click the Commit button at the upper-right of the web interface.
21. Minimize the Chromium browser by clicking the minimize icon and continue to the next task.
22. Return to the terminal window by clicking on the Terminal icon in the taskbar of your client
desktop.
23. From the terminal window on the desktop, enter the following commands. Use Ctrl+C to stop the
ping for the two commands after a few seconds.
24. Minimize the Terminal window by clicking the minimize icon in the upper-right.
25. If you minimized the firewall, reopen the firewall interface by clicking on the Chromium tab in the
taskbar. Leave the firewall interface open and continue to the next task.
26. Navigate to Monitor > Logs > Traffic. Enter the filter ( action eq deny ) in the Filter builder to look
for traffic that has been denied. You should see entries indicating that your Block-Known-Bad-IPs
security policy rule has denied traffic to each host.
Note some columns have been adjusted to view the information shown
in the screen shot.
27. Leave the Palo Alto Networks Firewall open and continue to the next task.
You can use Address Groups in security policy rules to control access to IP addresses. You can group
multiple Address objects in an Address Group and then use just the Address Group in your security
policy rules. Address Groups are used to shorten and simplify a policy or a policy rule.
You will create a static Address Group, add two Address objects to the group, and then modify the
security policy to use the Address Group.
Lastly, you will test access to the IP addresses contained in the Address objects.
1. In the firewall interface, select Objects > Address Groups. Click Add.
Parameter Value
Name Malicious-IP-Group
Description Contains malicious IP address objects
Type Static
Addresses Add malicious-fqdn-1 and malicious-ip-address-1
4. In the Security Policy Rule window, Destination tab, select the malicious-fqdn-1 and malicious-ip-
address-1 checkboxes. Click Delete.
5. In the Destination Address window, click Add. Select Malicious-IP-Group. Click OK.
9. Minimize the Chromium browser by clicking the minimize icon and continue to the next task.
10. Return to the terminal window by clicking on the terminal icon in the taskbar of your client
desktop.
11. From the terminal window on the desktop, enter the commands below. Use Ctrl+C to stop the ping
for the two commands after a few seconds.
C:\home\lab-user\
12. Minimize the Terminal window by clicking the minimize icon in the upper-right.
13. If you minimized the firewall, reopen the firewall interface by clicking on the Chromium tab in the
taskbar. Leave the firewall interface open and continue to the next task.
14. Navigate to Monitor > Logs > Traffic. Enter the filter ( action eq deny ) in the filter builder to look
for traffic that has been denied. You should see additional entries indicating that your Block-
Known-Bad-IPs security policy rule has denied traffic to each host.
15. Leave the Palo Alto Networks Firewall open and continue to the next task.
You can block access to IP addresses associated with specific geographic regions. This ability is useful
for reducing your attack surface by prohibiting traffic from countries where you have no legitimate
business contacts.
In this section, you will configure and test access to the blocked geographic region. After you have
tested access, you will restore access to the blocked region.
1. Minimize the Chromium browser by clicking the minimize icon and continue to the next task.
2. Return to the terminal window by clicking on the Terminal icon in the taskbar of your client
desktop.
3. From the terminal window on the desktop, enter the command below to obtain the IP Address of
2600.org. Write down the IP address or copy and paste it into a text document on the desktop.
4. In the same CMD window, verify connectivity to nic.ir by entering the command below. Use Ctrl+C
to stop the ping after a few seconds.
You may not get a response to the ping but that will not affect this lab.
5. Minimize the Terminal window by clicking the minimize icon in the upper-right.
6. If you minimized the Firewall, reopen the Firewall interface by clicking on the Chromium tab in the
taskbar.
7. In the web interface, select Policies > Security. Click Block-Known-Bad-IPs to edit the rule.
8. In the Security Policy Rule window, click the Destination tab and Add IR to the Destination
Address list. Click OK.
You will need to scroll down the list of available addresses to locate the
entry for IR.
16. Click the Commit button at the upper-right of the web interface.
19. Minimize the Chromium browser by clicking the minimize icon and continue to the next task.
20. Return to the terminal window by clicking on the Terminal icon in the taskbar of your client
desktop.
21. From the terminal window on the desktop, verify connectivity to nic.ir by entering the command
below. Use Ctrl+C to stop the ping after a few seconds.
The ping will fail because you blocked the region of IR.
22. Minimize the Terminal window by clicking the minimize icon in the upper-right.
23. If you minimized the firewall, reopen the firewall interface by clicking on the Chromium tab in the
taskbar.
24. Navigate to Monitor > Logs > Traffic. Enter the filter ( addr.dst in 194.225.70.16 ) in the
filter builder to look for traffic that has been denied. You should see entries indicating that your
Block-Known-Bad-IPs security policy rule has denied traffic to each host.
25. Leave the Palo Alto Networks Firewall open and continue to the next task.
You can add a list of malicious IP addresses to a file on an external web server and configure the
firewall to access the list as an EDL. The advantage of this approach is that the malicious IP address list
can be regularly updated without the need to recommit the firewall configuration, as you would have
to do if you updated an Address object or Address Group. EDLs simplify the maintenance of a current
list of IP addresses.
1. In the firewall interface, select Objects > External Dynamic Lists. Note the three predefined EDLs
contain known malicious and high-risk IP address lists. Click Palo Alto Networks – High risk IP
addresses.
3. Click the List Entries And Exceptions tab. Write down three IP addresses on the current list of IP
addresses. You will try to ping these addresses later in this lab exercise. Click Cancel.
For this step, we chose the first three IP Addresses on the list. You
may choose any IP Addresses you would like however, it is important
to write down the IP Address to complete this task.
Note that you can also copy and paste these addresses into a text file
on the client desktop.
5. In the External Dynamic Lists window, create another EDL and configure the following. Click Test
Source URL.
Parameter Value
Name custom-malicious-ips-edl
Type IP List
Description Contains manually entered IP address list on web
server.
Source http://192.168.50.80/malicious-ips.txt
(The EDL contains only the IP address 192.168.50.11.)
Check for updates Five Minute
6. The firewall should present a Test Source URL window indicating that it can access the URL. Click
Close.
8. Update the security policy to include External Dynamic Lists. Navigate to Policies > Security. Click
Block-Known-Bad-IPs to edit the rule.
9. Click the Destination tab and configure the following. Click OK.
Parameter Value
Destination Zone Internet
Destination Address Add the following to the list:
Palo Alto Networks – Bulletproof IP addresses
Palo Alto Networks – High risk IP addresses
Palo Alto Networks – Known malicious IP addresses
11. In the Security Policy Rule window, click the Destination tab and configure the following. Click OK.
Parameter Value
Destination Zone Extranet
Destination Address custom-malicious-ips-edl
Negate Select check box
12. Notice in the Users_to_Extranet rule that custom-malicious-ips-edl has a line through it. This line
indicates that the Negate option has been employed for addresses in the list.
13. Click the Commit button at the upper-right of the web interface.
16. Return to the terminal window by clicking on the Terminal icon in the taskbar of your client
desktop.
17. From the terminal window on the desktop, ping an address on the internet by issuing the following
command.
18. After a few seconds, use Ctrl+C to stop the connection because it will not succeed.
The ping should fail because the IP address is listed in the custom EDL.
19. From the terminal window, use ping again, but this time try one of the three IP addresses that you
wrote down earlier in lab step 3.
20. After a few seconds, use Ctrl+C to stop the connection because it will not succeed.
21. Minimize the Terminal window open on the client because you will perform this same task in a
later step.
22. If you minimized the Firewall, reopen the Firewall interface by clicking on the Chromium tab in the
taskbar.
23. Examine the traffic log again and use a simple filter to see if there are any entries for this session
that failed. Navigate to Monitor > Logs > Traffic. In the filter field, enter ( action neq allow )
and ( app eq ping ). Click the Apply Filter button in the upper-right corner of the window. You
will notice the firewall is now logging entries matching your filter.
24. In the firewall web interface, select Policies > Security. Click Users_to_Extranet to edit the rule.
25. In the Security Policy Rule window, click the Destination tab and configure the following. Click OK.
Parameter Value
Destination Zone Extranet
Destination Address Delete custom-malicious-ips-edl
Negate check box Deselect it
26. Click the Commit button at the upper-right of the web interface.
29. Leave the web interface open and continue to the next task.
You can add a list of malicious domains to a file on an external web server and then configure the
firewall to access the list as an EDL. The advantage of this approach is that the malicious domain list
can be updated regularly without the need to recommit the firewall configuration.
In this section, you will block access to malicious domains using an External Dynamic List.
1. In the PA-VM firewall web interface, navigate to Objects > External Dynamic Lists. Click Add at the
bottom of the window.
2. In the External Dynamic Lists window, configure the following. Click OK.
Parameter Value
Name malicious-domains-edl
Type Domain List
Source http://192.168.50.80/malicious-domains.txt
(The EDL contains the domains quora.com and
producthunt.com.)
Automatically expand to Select it
include subdomains
Check for updates Five Minute
5. The firewall should present a Test Source URL window indicating that it can access the URL. Click
Close.
You can add an EDL containing a domain list to an Anti-Spyware Profile to block access to malicious
domains. You must attach the Anti-Spyware Profile to a security policy rule that allows network access.
Although the security policy rule might allow the traffic, the attached Anti-Spyware Profile will block
access to any domains listed in the EDL.
In this section, you will add a domain list EDL to an anti-spyware profile.
1. In the web interface, select Objects > Security Profiles > Anti-Spyware. Select the checkbox next to
the strict Anti-Spyware Profile. Click Clone.
3. A new strict-1 Anti-Spyware Profile should have been created. Click strict-1 to edit the profile.
4. Rename the profile outbound-as. Click the DNS Policies tab. Under the External Dynamic Lists
section, change the Policy Action dropdown list to block. Click OK.
In this section, you will add the outbound-as Anti-Spyware Profile to the security policy. The
configuration of the profile will enable the firewall to use malicious domain signatures to block access
to malicious domains.
1. In the web interface, navigate to Policies > Security. Click Users_to_Internet to edit the rule.
2. In the Security Policy Rule window, configure the following on the Actions tab. Click OK.
Parameter Value
Profile Type Profiles
Anti-Spyware outbound-as
7. Return to the terminal window by clicking on the terminal icon in the taskbar of your client
desktop.
8. From the terminal window on the desktop, ping two addresses on the internet by issuing the
following commands. Use Ctrl+C to stop the ping for the two commands after a few seconds.
The ping commands should fail because the domains are listed in the
custom EDL and the custom EDL was added to the outbound-as Anti-
Spyware Profile and configured with the “block” action.
10. If you minimized the firewall, reopen the firewall interface by clicking on the Chromium tab in the
taskbar.
11. Examine the firewall traffic log by ensuring you are at Monitor > Logs > Threat. Clear any filters in
filter builder. You should see several entries indicating that the firewall has blocked DNS queries for
the hosts listed in the malicious-domains-edl.
The order of columns has been rearranged and several columns have
been hidden in the example above.
12. Minimize the Chromium browser by clicking the minimize icon and continue to the next task.
In this section, you will block access to known-malicious URLs by configuring the firewall’s URL Filtering
feature. You will add URL categories to a security policy rule configured to block traffic.
This script uses the XML API to clear the Threat, Traffic and URL
Filtering log files. We are clearing the log files to make it easier to
identify traffic and threats blocked by DoS Protection.
4. Press Enter to start the Clear Firewall Logs script. Allow the script to complete. Once the Clear
Firewall Logs script completes, press Enter.
5. If you minimized the firewall, reopen the firewall interface by clicking on the Chromium tab in the
taskbar.
7. Type hacker9.com which belongs to the URL category hacking in the address bar, and press Enter.
9. In the web interface, select Policies > Security. If the URL Category column is not displayed, click
the down-arrow menu that appears next to any column header (hover your pointer over a header
to see the down-arrow) and select Columns > URL Category.
You may need to scroll through the Security Policies to find the URL
Category once you have selected to display it.
10. In the Security Policies window, click Add to create a new security policy rule.
11. In the Security Policy Rule window, on the General tab, type block-known-bad-urls as the Name.
For Description, enter Blocks bad URL categories.
12. Click the Source tab and for the Source Zone, select Users_Net.
13. Click the Destination tab, and for the Destination Zone, select Internet.
14. Click the Application tab and verify that Any is selected.
15. Click the Service/URL Category tab and configure the following.
Parameter Value
Service application-default
URL Category Add the following:
adult
command-and-control
extremism
hacking
high-risk
malware
nudity
parked
peer-to-peer
phishing
proxy-avoidance-and-anonymizers
questionable
You can type in the first few letters of each category to locate each one
more quickly.
16. Click the Actions tab and for the action, select Deny. Verify Log at Session End is checked. Click OK.
17. Select, but do not open, the block-known-bad-urls rule in the security policy. Select Move > Move
Top to move the block-known-bad-urls rule to the top of the security policy.
18. Click the Commit button at the upper-right of the web interface.
22. Type hacker9.com which belongs to the URL category hacking in the address bar, and press Enter.
24. In the web interface, select Monitor > Logs > URL Filtering. If the URL Category List column is not
displayed, click the down-arrow menu that appears next to any column header (hover your pointer
over a header to see the down-arrow) and select Columns > URL Category List.
You should see multiple entries that have been blocked. Several
default columns have been hidden in the example URL Filtering log file
shown here.
25. Leave the firewall open and continue to the next task.
In this section, you will add your Custom URL Category to a security policy rule that has a “deny”
action.
2. Type www.nbcnews.com and press Enter. The browser should display a valid webpage.
4. In the web interface, select Objects > Custom Objects > URL Category. Click Add.
5. In the Custom URL Category window, configure the following. Click OK.
Parameter Value
Name block-per-company-policy
Description URLs that are blocked by company policy.
Sites Add the following:
*.nbcnews.com
*.theguardian.com
6. Confirm the block-per-company-policy Custom URL is showing in the URL Category window.
7. Add your Custom URL Category to a security policy rule that has a deny action. Select Policies >
Security. Click block-known-bad-urls to edit the rule.
8. Select the Service/URL Category tab and click Add. Add block-per-company-policy to the list. Click
OK.
12. Test access to URLs that belong to the Custom URL Category that you added to a security policy
deny rule. Open two new tabs in Chromium.
13. Type www.nbcnews.com on the first tab and press Enter. Type www.theguardian.com on the
second tab and press Enter.
The browser should display an error message because the Custom URL
Category in the security policy blocks access to the webpage.
14. Close the nbcnews and theguardian tabs by clicking the X icon.
15. In the web interface, select Monitor > Logs > URL Filtering. If the URL Category column is not
displayed, click the down-arrow menu that appears next to any column header (hover your pointer
over a header to see the down-arrow) and select Columns > URL Category.
16. Leave the firewall open and continue to the next task.
You can add a list of malicious URLs to a file on an external web server and then configure the firewall
to access the list as an EDL. The advantage of this approach is that you can regularly update the
malicious URL list without the need to recommit the firewall configuration each time, as you would
have to do if you updated a security policy rule with a new URL.
In this section, you will create an EDL to block malicious URL access.
1. In the web interface, select Objects > External Dynamic Lists. Click Add.
2. In the External Dynamic Lists window, configure the following. Click OK.
Parameter Value
Name malicious-urls-edl
Type URL List
Source http://192.168.50.80/malicious-urls.txt
(The EDL contains only the URL www.popurls.com)
Check for updates Five Minute
4. Click Test Source URL and verify the firewall can access the EDL URL.
5. In the Test Source URL window, verify the Source URL is accessible. Click Close.
7. Add the EDL containing the malicious URL list to a security policy rule with a deny action. In the web
interface, select Policies > Security. Click block-known-bad-urls to edit the rule.
8. In the Security Policy Rule window, click the Service/URL Category tab. Add malicious-urls-edl to
the list. Click OK.
12. Test access to a URL contained in the EDL that you added to the block-known-bad-urls security
policy. Open a new tab in Chromium.
14. The browser displays a block page because the EDL in the security policy blocks access to the
popurls.com webpage.
The browser should display an error message because the Custom URL
Category in the security policy blocks access to the webpage.
16. In the web interface, select Monitor > Logs > URL Filtering. Type ( action eq block-url ) in
the filter builder. You should see multiple entries for sessions to www.popurls.com that the firewall
has blocked.
17. Leave the firewall open and continue to the next task.
Now you will configure a URL Filtering Profile to control access to URLs. You must add the URL Filtering
Profile to a security policy rule with an “allow” action. The use of a URL Filtering Profile to block access
to URLs typically is easier to maintain over time compared to the addition of URLs to a security policy
block rule. You will also enable the Application Block Page, which instructs the firewall to present a
warning page to users when they access websites that have been purposely blocked.
In this section, you will block access to a Malicious URL with a URL Filtering Profile and test the URL
Filtering Profile.
1. In the web interface, select Device > Response Pages. Locate the entry for Application Block Page
and click the link for Disabled under the Action column.
2. In the Application Block Page window, place a check in the box for Enable Application Block Page.
Click OK.
6. Test the Application Block Page response. Open a new tab in Chromium.
8. The browser displays a block page because the EDL in the security policy blocks access to the
evilzone.org webpage.
The browser should display a block page because the URL belongs to
the URL category hacking, which is blocked by a security policy rule.
You will continue to block access to this website but will use another
method.
10. In the web interface, select Objects > Security Profiles > URL Filtering. Click Add to create a new
profile.
11. In the URL Filtering Profile, type Corp-URL-Profile as the Name of the profile. For Description,
enter Company URL Filtering profile.
12. On the Categories tab, configure the following. You will need to scroll through each Category for
the value to set it to block the site access.
Parameter Value
Site Access Configure the block action for the following URL categories:
block-per-company-policy* (your Custom URL Category)
malicious-urls-edl+ (your custom URL list)
adult
command-and-control
extremism
hacking
high-risk
malware
nudity
parked
peer-to-peer
phishing
proxy-avoidance-and-anonymizers
questionable
These categories are the same ones you set to block earlier using the
URL Category as part of the security policy rule. In this configuration,
the firewall will use the URL Filtering profile to block these categories.
13. Select the tab for Inline ML. For Phishing Detection and Javascript Exploit Detection, set the Policy
Action to block. Click OK.
14. In the web interface, select Policies > Security. Click Users_to_Internet to edit the rule.
15. In the Security Policy Rule window, click the Actions tab and configure the following. Click OK.
Parameter Value
Action Allow
Log Setting Log at Session End
Profile Type Profiles
URL Filtering Corp-URL-Profile
16. Select, but do not open the block-known-bad-urls security policy rule. Click Delete to remove the
block-known-bad-urls rule.
This rule no longer will be used to block access to the URLs. Instead,
the “Users_to_Internet” rule with its attached URL Filtering Profile will
control URL access.
17. In the Security Rule window, click Yes to confirm the deletion.
18. Click the Commit button at the upper-right of the web interface.
21. Test the Application Block Page response. Open a new tab in Chromium.
23. The browser displays a block page because the EDL in the security policy blocks access to the
evilzone.org webpage. If the Web Page Blocked message does not appear, allow 1 to 3 minutes for
the firewall to process the changes, then refresh the evilzone.org tab.
The browser should display a block page because the URL belongs to
the URL category hacking, which is blocked by a security policy rule.
You will continue to block access to this website but will use another
method.
25. Examine the URL Filtering Log under Monitor > Logs > URL Filtering.
26. The lab is now complete; you may end your reservation.