<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application Shift and How to allow linkedIn but block specific linkedin-posting application in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-shift-and-how-to-allow-linkedin-but-block-specific/m-p/1234748#M6132</link>
    <description>&lt;P&gt;I wanna know how to block only linkedin messaging part as I have been struggling to do that&lt;/P&gt;</description>
    <pubDate>Sun, 27 Jul 2025 14:05:15 GMT</pubDate>
    <dc:creator>lucydeapple</dc:creator>
    <dc:date>2025-07-27T14:05:15Z</dc:date>
    <item>
      <title>Application Shift and How to allow linkedIn but block specific linkedin-posting application</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-shift-and-how-to-allow-linkedin-but-block-specific/m-p/577599#M2670</link>
      <description>&lt;P&gt;When you want to allow the &lt;STRONG&gt;linkedin-base&lt;/STRONG&gt; application with a specific Security Policy Rule, for example Linkedin-Rule, the Implicit applications it depends to are automatically allowed by the firewall, this means that the Security Policy Rule &lt;STRONG&gt;Linkedin-Rule&lt;/STRONG&gt; that matches the &lt;STRONG&gt;linkedin-base&lt;/STRONG&gt; application will automatically allow the &lt;STRONG&gt;web-browsing&lt;/STRONG&gt; and &lt;STRONG&gt;SSL&lt;/STRONG&gt; applications.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_0-1708248019818.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57704i45F87190FA1C959D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_0-1708248019818.jpeg" alt="rmeddane_0-1708248019818.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below the Security Policy Rule named &lt;STRONG&gt;Linkedin-Rule&lt;/STRONG&gt; that allows only the &lt;STRONG&gt;linkedin-base&lt;/STRONG&gt; application.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_1-1708248019825.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57705i4E7382832CBBA319/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_1-1708248019825.jpeg" alt="rmeddane_1-1708248019825.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Traffic logs shown that the firewall allows the Implicit application &lt;STRONG&gt;web-browser&lt;/STRONG&gt; using the same Security Policy Rule &lt;STRONG&gt;Linkedin-Rule&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_2-1708248019832.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57706i220514A633422182/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_2-1708248019832.jpeg" alt="rmeddane_2-1708248019832.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But when you allow the &lt;STRONG&gt;linkedin-base&lt;/STRONG&gt; application in Security Policy Rule, the subsequent linkedin applications such as &lt;STRONG&gt;linkedin-mail&lt;/STRONG&gt;, &lt;STRONG&gt;linkedin-downloading&lt;/STRONG&gt; etc…are not allowed by this rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From the Traffic logs, we can see that the user &lt;STRONG&gt;platini&lt;/STRONG&gt; cannot use the &lt;STRONG&gt;linkedin-downloading&lt;/STRONG&gt; and &lt;STRONG&gt;linkedin-mail&lt;/STRONG&gt; applications, both are denied by the default rule &lt;STRONG&gt;interzone-default&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_3-1708248019840.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57708i9444A838C3C7C11D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_3-1708248019840.jpeg" alt="rmeddane_3-1708248019840.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to allow all linkedin applications included in the following list such as &lt;STRONG&gt;linkedin-downloading&lt;/STRONG&gt;, &lt;STRONG&gt;linkedin-mail&lt;/STRONG&gt;, &lt;STRONG&gt;linkedin-uploading&lt;/STRONG&gt;, &lt;STRONG&gt;linkedin-learning&lt;/STRONG&gt; etc... You need to use the parent application &lt;STRONG&gt;linkedin&lt;/STRONG&gt; as shown below, or you can specifiy only some applications.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_4-1708248019845.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57709i787787D5BF80D5D2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_4-1708248019845.jpeg" alt="rmeddane_4-1708248019845.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this example, the Security Policy Rule is ajusted to allow all linkedin applications using the parent application &lt;STRONG&gt;linkedin&lt;/STRONG&gt; instead of &lt;STRONG&gt;linkedin-base&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note&amp;nbsp;: some applications needs to be explicitly allowed as shown by the &lt;STRONG&gt;DEPENDS ON&lt;/STRONG&gt; field, the &lt;STRONG&gt;imap&lt;/STRONG&gt; and &lt;STRONG&gt;smtp-base&lt;/STRONG&gt; applications must be explicitly allow by checking and adding these application into this Rule. Imap and smtp-base applications must be added to this rule for &lt;STRONG&gt;linkedin-intro&lt;/STRONG&gt; application.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_5-1708248019847.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57707iCC906410F29C039B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_5-1708248019847.png" alt="rmeddane_5-1708248019847.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now the Security Policy Rule &lt;STRONG&gt;Linkedin-Rule&lt;/STRONG&gt; is modified to use the parent application &lt;STRONG&gt;linkedin&lt;/STRONG&gt; instead of &lt;STRONG&gt;linkedin-base&lt;/STRONG&gt; application.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_6-1708248019851.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57711i4DE1D2C0D1CB2FCE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_6-1708248019851.jpeg" alt="rmeddane_6-1708248019851.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now the user &lt;STRONG&gt;platini&lt;/STRONG&gt; can use the &lt;STRONG&gt;linkedin-downloading&lt;/STRONG&gt; and &lt;STRONG&gt;linkedin-mail&lt;/STRONG&gt; applications as shown below as well as linkedin-learning, linkedin-uploading, linkedin-intro etc…&lt;/P&gt;
&lt;P&gt;The Security Policy Rule &lt;STRONG&gt;Linkedin-Rule&lt;/STRONG&gt; can now allow all linkedin applications because the parent application &lt;STRONG&gt;linkedin&lt;/STRONG&gt; is used as a match criteria instead of &lt;STRONG&gt;linkedin-base&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_7-1708248019857.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57710iCD5CAE1D5485EE77/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_7-1708248019857.jpeg" alt="rmeddane_7-1708248019857.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now what if we want to deny specific linkedin application such as&lt;STRONG&gt; linkedin-posting&lt;/STRONG&gt;. In this case we need to add a specific Rule to match the &lt;STRONG&gt;linkedin-posting &lt;/STRONG&gt;application with the &lt;STRONG&gt;Deny&lt;/STRONG&gt; action above the Security Rule &lt;STRONG&gt;Linkedin-Rule&lt;/STRONG&gt; as shown below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_8-1708248019861.jpeg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57712iFC000742EFB03BE1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_8-1708248019861.jpeg" alt="rmeddane_8-1708248019861.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From the Traffic logs, we can see that the &lt;STRONG&gt;linkedin-posting&lt;/STRONG&gt; application is blocked by the Security Policy Rule &lt;STRONG&gt;Linkedin-Posting-Rule&lt;/STRONG&gt; for the same user &lt;STRONG&gt;platini&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because the Application Shift feature on Palo Alto Firewall, the traffic of the user platini transitions from &lt;STRONG&gt;web-browser&lt;/STRONG&gt; application to more specific application &lt;STRONG&gt;linkedin-posting&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the Traffic logs, the entry in the blue color shown that the Security Rule &lt;STRONG&gt;Linkedin-Rule&lt;/STRONG&gt; allows the &lt;STRONG&gt;web-browsing&lt;/STRONG&gt; application, later the same user transitions to more specific application so it is passed through the list of security rules again to see if there is a match. In this scenario, the same user is transitioning to &lt;STRONG&gt;linkedin-posting&lt;/STRONG&gt; application and the firewall checks again the Rules and finds a match with the Security Policy Rule &lt;STRONG&gt;Linkedin-Posting&lt;/STRONG&gt; and applies the action &lt;STRONG&gt;Deny&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rmeddane_9-1708248019864.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57713i09B24BD30025B27B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rmeddane_9-1708248019864.png" alt="rmeddane_9-1708248019864.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 09:24:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-shift-and-how-to-allow-linkedin-but-block-specific/m-p/577599#M2670</guid>
      <dc:creator>rmeddane</dc:creator>
      <dc:date>2024-02-18T09:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: Application Shift and How to allow linkedIn but block specific linkedin-posting application</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-shift-and-how-to-allow-linkedin-but-block-specific/m-p/1234748#M6132</link>
      <description>&lt;P&gt;I wanna know how to block only linkedin messaging part as I have been struggling to do that&lt;/P&gt;</description>
      <pubDate>Sun, 27 Jul 2025 14:05:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/application-shift-and-how-to-allow-linkedin-but-block-specific/m-p/1234748#M6132</guid>
      <dc:creator>lucydeapple</dc:creator>
      <dc:date>2025-07-27T14:05:15Z</dc:date>
    </item>
  </channel>
</rss>

