FQDN (Fully Qualified Domain Name) Match Object¶
An FQDN Match Object evaluates the SNI associated with TLS-encrypted traffic and uses the results of the evaluation for Rule matching. If traffic matches all match objects (Address, FQDN,Service) associated with a Rule, then the Rule will be used for processing the traffic. In order to evaluate the FQDN, traffic must be TLS encrypted and contain an SNI in a TLS hello header. The FQDN can be evaluated for traffic that is processed by either a Forwarding or Forward Proxy Rule. The set of FQDNs in the Profile can be specified as strings representing the full domain or as strings represented by a Perl Compatible Regular Expression (PCRE).
Tech Notes
The FQDN Match Object is organized as a table containing user-specified rows (FQDNs)
The limits for each FQDN Match Object are as follows:
- Maximum user-specified rows: 254 (Standalone or Group of Standalones)
- Maximum FQDNs per row: 60
- Maximum FQDN character length: 255
When specifying a multi-level domain (e.g., www.example.com
), it's important to escape the .
character (e.g.,www\.example\.com
) otherwise it will be treated as a wildcard for any single character.
Standalone vs. Group¶
A FQDN Match Object can be specified as Type Standalone or Group.
A FQDN Match Standalone Object contains FQDNs. The Object will be applied directly to a set of one or more Policy Ruleset Rules or associated with a FQDN Match Group Object.
A FQDN Match Group Object contains an ordered list of Standalone FQDN Objects that can be defined for different purposes and combined together into a Group Object. The Group Object can be applied directly to a set of one or more Policy Ruleset Rules. Each team can create and manage specific Standalone Profiles. These Standalone Profiles can be combined together into a Group Profile to create hierarchies or different combinations based on use case. An example combination could be a global FQDN list that would apply to everything, a CSP-specific list that would apply to each different CSP, and an application-specific list that would apply to each different application.
Create the Object¶
Standalone¶
- Navigate to Manage -> Security Policies -> FQDNs
- Click Create
- Provide a Profile Name and Description
- Specify the Type as Standalone
- Click Add to create a new row
- Specify individual FQDNs (e.g., www.twitter.com, .*.google.com)
- Each FQDN is specified as a PCRE (Perl Compatible Regular Expression)
- Consider escaping the
.
character else it will be treated as a single character wildcard
- (Optional) Specify Decryption Exception for any FQDNs where decryption is not desired or possible. Possible reasons for considering Decryption Exception include:
- Desire to not inspect encrypted traffic (financial services, defense, health care, etc.)
- SSO authentication traffic where decryption is not possible
- NTLM traffic that cannot be proxied
- Click Save when completed
Group¶
- Navigate to Manage -> Security Policies -> FQDNs
- Click Create
- Provide a Profile Name and Description
- Specify the Type as Group
- Select an initial Standalone Profile (at least one Standalone Profile is required)
- Specify additional Standalone Profiles
- Click Add FQDN Profile to create a new row
- Select a Standalone Profile
- Click Save when completed
Associate the Object¶
Check this document to create/edit Policy Rules