<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application incomplete or insufficient-data when using NNTPS in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/521078#M572</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/187812"&gt;@MIST3R_VIRTS3C&lt;/a&gt;&amp;nbsp;Thank you for the suggestions. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I will try the packet filters as soon as I get access to my lab and I'll let you know the results.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;/Jorgen&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 12 Nov 2022 18:49:36 GMT</pubDate>
    <dc:creator>jorgenfrejso</dc:creator>
    <dc:date>2022-11-12T18:49:36Z</dc:date>
    <item>
      <title>Application incomplete or insufficient-data when using NNTPS</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/520806#M558</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been working with Cisco firewalls for the last 20 years, but I'm very new with Palo Alto and PANOS.&lt;/P&gt;
&lt;P&gt;At the moment I have a PA-460 in my lab for learning purpose.&lt;/P&gt;
&lt;P&gt;It's a basic setup with just a simple NAT/PAT rule for outgoing traffic to Internet and some basic access rules.&lt;/P&gt;
&lt;P&gt;Most things are working great, but I'm having some issues with a newsreader application (SABnzbd) that I'm running on a Synology NAS.&lt;/P&gt;
&lt;P&gt;The newsreader application cannot download any files and in the&amp;nbsp;traffic monitor, I see either incomplete or insufficient-data.&lt;/P&gt;
&lt;P&gt;This application has been working without any issues when using a Cisco Firepower FTD firewall, so I am trying to figure out what can be wrong.&lt;/P&gt;
&lt;P&gt;The newsreader is using TCP port 563 (which is the default&amp;nbsp;port for&amp;nbsp;&lt;SPAN&gt;NNTP protocol over&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;TLS&lt;/EM&gt;&lt;SPAN&gt;/SSL). If I change the port to 443, everything is working and I can now download files. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does anyone know why I'm not able to use port 563 and how I can fix this?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;/Jorgen&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 15:25:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/520806#M558</guid>
      <dc:creator>jorgenfrejso</dc:creator>
      <dc:date>2022-11-09T15:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: Application incomplete or insufficient-data when using NNTPS</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/521062#M571</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/256731"&gt;@jorgenfrejso&lt;/a&gt;&amp;nbsp;, hope all is well! For next steps I would recommend setting up packet filters for the traffic in question and then collecting a packet capture and the global counters from the cli. You can use the following commands on the cli:&lt;BR /&gt;&lt;BR /&gt;debug dataplane packet-diag set filter match source &amp;lt;synology ip&amp;gt; destination-port 563&lt;BR /&gt;debug dataplane packet-diag set filter match destination &amp;lt;synology ip&amp;gt; source-port 563&lt;BR /&gt;debug dataplane packet-diag set filter on&lt;BR /&gt;&lt;BR /&gt;debug dataplane packet-diag set capture stage receive file rxtx.pcap&lt;BR /&gt;debug dataplane packet-diag set capture stage transmit file rxtx.pcap&lt;BR /&gt;debug dataplane packet-diag set capture stage drop file dp.pcap&lt;BR /&gt;debug dataplane packet-diag set capture stage firewall file fw.pcap&lt;BR /&gt;debug dataplane packet-diag set capture on&lt;BR /&gt;&lt;BR /&gt;show counter global filter packet-filter yes&lt;BR /&gt;&lt;BR /&gt;****Start Test Traffic***&lt;BR /&gt;&lt;BR /&gt;debug dataplane packet-diag show filter-marked-session&lt;BR /&gt;&lt;BR /&gt;show session id &amp;lt;id from above output&amp;gt;&lt;BR /&gt;&lt;BR /&gt;show counter global filter packet-filter yes delta yes &amp;lt;------ Run this command once every 5-10 seconds for 3 intervals (or until the test is complete)&lt;BR /&gt;&lt;BR /&gt;debug dataplane packet-diag set capture off&lt;BR /&gt;&lt;BR /&gt;**copy the output from the global counters command to a notepad file**&lt;BR /&gt;download the packet captures from the gui by navigating to Monitor &amp;gt; Packet Capture&lt;BR /&gt;screenshots of your security policy rulebase would be helpful as well&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 22:27:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/521062#M571</guid>
      <dc:creator>MIST3R_VIRTS3C</dc:creator>
      <dc:date>2022-11-11T22:27:35Z</dc:date>
    </item>
    <item>
      <title>Re: Application incomplete or insufficient-data when using NNTPS</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/521078#M572</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/187812"&gt;@MIST3R_VIRTS3C&lt;/a&gt;&amp;nbsp;Thank you for the suggestions. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I will try the packet filters as soon as I get access to my lab and I'll let you know the results.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;/Jorgen&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Nov 2022 18:49:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/521078#M572</guid>
      <dc:creator>jorgenfrejso</dc:creator>
      <dc:date>2022-11-12T18:49:36Z</dc:date>
    </item>
    <item>
      <title>Re: Application incomplete or insufficient-data when using NNTPS</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/521094#M574</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/256731"&gt;@jorgenfrejso&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You probably have your service in your security policy rules set to application-default.&amp;nbsp; With any protocol that runs over TLS (LDAPS, NNTP, etc.), the protocol is encapsulated &lt;EM&gt;within&lt;/EM&gt; TLS.&amp;nbsp; Without decryption, the NGFW only sees TLS.&amp;nbsp; The default port for the App-ID "ssl" is 443, and that is the only port that TLS will be allowed to pass through the NGFW if the service is set to application-default.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can do a quick test.&amp;nbsp; Change the service to any and see if it works.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you enable logging on the interzone-default rule, you should see the traffic hit that rule under Monitor &amp;gt; Logs &amp;gt; Traffic.&amp;nbsp; Just like the other firewalls you have experience, if it hits the default drop then it didn't match any rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note:&amp;nbsp; Monitor &amp;gt; Logs &amp;gt; Traffic only shows sessions that have ended if you have Log at Session End configured for your rules, which is the best practice.&amp;nbsp; Active sessions are found under Monitor &amp;gt; Session Browser.&amp;nbsp; If you do not have any logging configured for rules, they will not show up under the Monitor tab.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Sun, 13 Nov 2022 20:43:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/521094#M574</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-11-13T20:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: Application incomplete or insufficient-data when using NNTPS</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/521266#M581</link>
      <description>&lt;P&gt;Thanks Tom,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are probalby right&amp;nbsp;about the&amp;nbsp;&lt;SPAN&gt;security policy rules is set to application-default. I noticed a similair issue with IMAP over SSL.&lt;/SPAN&gt;&amp;nbsp;I will test to change it to any and let you know the result.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Jorgen&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 12:49:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/521266#M581</guid>
      <dc:creator>jorgenfrejso</dc:creator>
      <dc:date>2022-11-15T12:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: Application incomplete or insufficient-data when using NNTPS</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/521278#M582</link>
      <description>&lt;P&gt;I can confirm that NNTPS and IMAP over SSL are working when change the service from application-default to any.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also noticed the option to specify custom applications and ports but is there a way to add ports to the application-default? Or can I make a clone of it and add the ports I need?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;/Jorgen&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 14:57:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/521278#M582</guid>
      <dc:creator>jorgenfrejso</dc:creator>
      <dc:date>2022-11-15T14:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: Application incomplete or insufficient-data when using NNTPS</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/521280#M583</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/256731"&gt;@jorgenfrejso&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are correct.&amp;nbsp; You cannot have a rule with application-default and specific ports.&amp;nbsp; You are also correct that it is a good idea to clone the rule and have 2 rules - 1 with application default and 1 with specific ports.&amp;nbsp; In this case since "ssl" only has the default port of tcp/443, I would change application-default to those 3 ports - tcp/443, tcp/563, and tcp/993.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you left the rule with "ssl" and any for the services, the security rule would allow a few packets on all ports until the application is identified.&amp;nbsp; This method is the least secure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 15:06:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-incomplete-or-insufficient-data-when-using-nntps/m-p/521280#M583</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-11-15T15:06:18Z</dc:date>
    </item>
  </channel>
</rss>

