4784 Broadway, New York, NY 10034

×

    Need help? Call Us: +1800900122
    Just Mail Us: support@gmail.com
    Just Mail Us:

    55 Main Street, 2nd Blok, 3rd Floor, New York City

    What Are External Dynamic Lists (EDLs)

    In simple terms, it is a collection of known malicious IP addresses maintained by various providers, used to block or deny incoming connections from those sources in network security systems like firewalls. These lists help enhance security by preventing access from potentially harmful entities.

    This helps organizations dynamically respond to threats by pulling in real-time data about malicious IPs, domains, or URLs without constant manual updates.

    Article content

    Why Use EDLs?

    EDLs allow you to do the following.

    • Automate Threat Prevention: Block or allow traffic based on threat intelligence feeds that update automatically.
    • Respond to Emerging Threats: Integrate with third-party sources like threat intel platforms, open-source feeds (e.g., FireHOL, Spamhaus), or internal lists.
    • Reduce Manual Work: There is no need to update firewall policies every time a new malicious IP/domain is discovered.
    • Customize Security Posture: Build rules that reflect the unique threat landscape of your organization.

    NOTES

    If you want to implement this EDL server, you need to subscribe to a provider that can provide threat intelligence beyond what the firewall knows.

    Or as a best practice, create your own Local EDL list like I’m going to show you. If you want to deploy this, you only need a web server, such as IIS, Tomcat, or any variation. Once you’ve done that, you can drop your (.txt) EDL in the correct format. It will look something like this.

    Article content
    IP and Domain Lists.

    Inbound Traffic

    Article content
    Inbound

    Explanation

    • The Attacker tries to send malicious traffic to the firewall.
    • The firewall sees the traffic and checks its EDL list from the server.
    • The firewall blocks the traffic because the EDL contains the attacker’s malicious IP.

    Outbound Traffic

    Article content
    Outbound

    Explanation

    • The user opened a phishing email with a malicious URL/domain.
    • The firewall sees the traffic and checks its EDL list from the server.
    • Traffic will be denied if the URL contains a harmful domain.

    Best Practices

    • Reference the EDL in all your Security Policies
    • Your EDL list can include IP hosts, subnets, ranges, FQDNs, and URLs.
    • Validate EDLs regularly — avoid stale or inaccessible lists.
    • You can use a backup static list in case the EDL source goes offline.
    • Avoid using low-reputation or unverified sources to reduce false positives.
    • Monitor EDL status from the dashboard: Monitor > System Logs (search for EDL or URL failures)

    Thoughts

    External Dynamic Lists (EDLs) really enhance Palo Alto firewalls by seamlessly blending automation with intelligence. Whether you’re blocking known threats or managing access to potentially risky categories. I hope this is informative for you.

    Cheers,

    Posted in
    Uncategorized
    Related Posts

    Post a comment

    Your email address will not be published.

    ×

    Loading...