Vigyata.AI
Is this your channel?

#paloaltofirewalltraining | Day 33 | What is External Dynamic Lists | Detailed Explanation | Lab

1.7K views· 41 likes· 21:30· Mar 30, 2025

🛍️ Products Mentioned (2)

Join this channel to get access to perks: https://www.youtube.com/channel/UCBujQdd5rBRg7n70vy7YmAQ/join Please checkout my new video on What is External Dynamic Lists in Palo Alto. If you like this video give it a thumps up and subscribe my channel for more video. Have any question put it on comment section Recommend Video Recommend Link (Playlist for EVE-NG LAB Setup) https://www.youtube.com/playlist?list=PLaUiizP3D7fPMmUQqS5QKX_FVSoMP68Z5 Palo Alto Certification information URL: https://www.paloaltonetworks.com/services/education For Palo Alto Documentation https://docs.paloaltonetworks.com/ Please follow me Instagram : https://www.instagram.com/bikashtech Twitter : https://twitter.com/Bikashshaw82 E-mail ID : bikashshaw261@gmail.com #Paloaltotraining ##bikashtech #paloaltofirewalltraining #paloaltonetworks #url #sslcertificate #ssl

About This Video

Hello friends, welcome back. This is Day 33 of my PCNSA Palo Alto Firewall training series, and in this video I covered one very important real-time topic: External Dynamic Lists (EDL). In my previous session I explained URL categories and how to block categories using URL filtering, and today I extended the same concept to show how EDL works as a dynamic list of IPs/URLs that the firewall can pull from a given URL. The key point is: EDL is dynamic in nature, it keeps updating automatically, and to use it you must have the proper license (I showed it with Threat/Threat Prevention type licensing) and you need to keep your dynamic updates (Applications & Threats and Antivirus) updated. In the lab, I used the same topology from my URL filtering setup and showed you where to find EDL under Objects. After updating signatures, you can see multiple high-risk/malicious IP lists maintained by Palo Alto Networks. Then I created security policies to drop traffic both inbound and outbound if the source/destination matches those EDL objects—so you can block known bad IPs without manually maintaining the list. Finally, I demonstrated the admin side: how to create my own custom URL category (admin-defined list) and allow a specific URL even when the full category (like “hacking”) is blocked. I tested it from the client PC to prove one allowed URL works while other hacking-category sites still get blocked.

Frequently Asked Questions

🎬 More from Bikash's Tech