<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Patterns in custom app signature only recognizing half the tcp port traffic in Automation/API Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/patterns-in-custom-app-signature-only-recognizing-half-the-tcp/m-p/4865#M118</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind of at my wits end. I could sure use some assistance.&lt;/P&gt;&lt;P&gt;I have created some custom app-ids with signatures with success that recognize 100% of the traffic and other app-ids with signatures that fall short.&lt;/P&gt;&lt;P&gt;The ones that fall short only recognize 50% of the traffic with other half labeled as "Insufficient data."&lt;/P&gt;&lt;P&gt;The description that I am giving is more about the process of how I am trying to accomplish this. Hopefully you can point some basic thing that I am fundamentally not doing right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created packet captures from the Palo Alto firewall of all the custom tcp port traffic that I need to make custom app-ids with pattern signatures for.&lt;/P&gt;&lt;P&gt;After analyzing the tcp sessions in the .pcap files in Wireshark, I found about 16 repeating patterns in the client data payload requests to the server for a particular custom tcp port traffic.&lt;/P&gt;&lt;P&gt;For the custom app-id, I made 1 Session based signature that consisted of 16 patterns. The patterns are all: 'or condition' (&lt;SPAN style="text-decoration: underline;"&gt;not&lt;/SPAN&gt; ordered), "pattern match",&amp;nbsp; "unknown-rec-tcp-payload",&amp;nbsp; and 7 byte in length.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I commit the changes and monitor the traffic, the traffic I created the custom app-id for recognizes about 50% of the traffic with my custom app-id label correctly applied with other half of the same port traffic labeled as "Insufficient data."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created additional packet captures and analyzed all the tcp port client request payloads of all the tcp sessions labled as "Insufficient data."&lt;/P&gt;&lt;P&gt;Originally I thought I missed some repeating client traffic request patterns but the thing is, they all have payloads with the patterns that I have entered into my custom app-id signature already.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did I miss something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your help and input is greatly appropriated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 05 Jun 2015 03:08:29 GMT</pubDate>
    <dc:creator>twheeler</dc:creator>
    <dc:date>2015-06-05T03:08:29Z</dc:date>
    <item>
      <title>Patterns in custom app signature only recognizing half the tcp port traffic</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/patterns-in-custom-app-signature-only-recognizing-half-the-tcp/m-p/4865#M118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind of at my wits end. I could sure use some assistance.&lt;/P&gt;&lt;P&gt;I have created some custom app-ids with signatures with success that recognize 100% of the traffic and other app-ids with signatures that fall short.&lt;/P&gt;&lt;P&gt;The ones that fall short only recognize 50% of the traffic with other half labeled as "Insufficient data."&lt;/P&gt;&lt;P&gt;The description that I am giving is more about the process of how I am trying to accomplish this. Hopefully you can point some basic thing that I am fundamentally not doing right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created packet captures from the Palo Alto firewall of all the custom tcp port traffic that I need to make custom app-ids with pattern signatures for.&lt;/P&gt;&lt;P&gt;After analyzing the tcp sessions in the .pcap files in Wireshark, I found about 16 repeating patterns in the client data payload requests to the server for a particular custom tcp port traffic.&lt;/P&gt;&lt;P&gt;For the custom app-id, I made 1 Session based signature that consisted of 16 patterns. The patterns are all: 'or condition' (&lt;SPAN style="text-decoration: underline;"&gt;not&lt;/SPAN&gt; ordered), "pattern match",&amp;nbsp; "unknown-rec-tcp-payload",&amp;nbsp; and 7 byte in length.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I commit the changes and monitor the traffic, the traffic I created the custom app-id for recognizes about 50% of the traffic with my custom app-id label correctly applied with other half of the same port traffic labeled as "Insufficient data."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created additional packet captures and analyzed all the tcp port client request payloads of all the tcp sessions labled as "Insufficient data."&lt;/P&gt;&lt;P&gt;Originally I thought I missed some repeating client traffic request patterns but the thing is, they all have payloads with the patterns that I have entered into my custom app-id signature already.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did I miss something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your help and input is greatly appropriated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jun 2015 03:08:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/patterns-in-custom-app-signature-only-recognizing-half-the-tcp/m-p/4865#M118</guid>
      <dc:creator>twheeler</dc:creator>
      <dc:date>2015-06-05T03:08:29Z</dc:date>
    </item>
  </channel>
</rss>

