<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application and services in security policy rules in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502086#M105287</link>
    <description>&lt;P&gt;The service configuration limits which ports the applications are allowed to use&lt;/P&gt;
&lt;P&gt;Setting tcp-22 in the services limits ALL applications to only be allowed through tcp:22 (so DNS will need to use TCP 22 instead of UDP 53)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if DNS needs to be allowed too, you'll need to add udp53 to the services&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 09 Jun 2022 08:49:48 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2022-06-09T08:49:48Z</dc:date>
    <item>
      <title>Application and services in security policy rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/501954#M105278</link>
      <description>&lt;P&gt;Hi I have a question,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Following rule,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Application allowed- DNS,SSL,WEB-Browsing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Service allowed - TCP port 22&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jatinsingh06_1-1654734297058.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/41674i1B39FBBEDAF3C83D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="jatinsingh06_1-1654734297058.png" alt="jatinsingh06_1-1654734297058.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I understand DNS, SSL and Web-browsing would be allowed on port 22, but my question is SSH&amp;nbsp; traffic&amp;nbsp; would be allowed by this rule as I am allowing port-22 via service.?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also My second question, would DNS traffic&amp;nbsp; be allowed on its standard&amp;nbsp; port 53 via this rule?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My understanding is Palo matches Both Services and Application together, hence SSH traffic would be blocked in this case and DNS traffic on port 53 would&amp;nbsp; also be blocked?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Referring this article - &lt;A href="https://live.paloaltonetworks.com/t5/blogs/what-are-applications-and-services/ba-p/342508" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/blogs/what-are-applications-and-services/ba-p/342508&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2022 00:48:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/501954#M105278</guid>
      <dc:creator>jatin.singh06</dc:creator>
      <dc:date>2022-06-09T00:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: Application and services in security policy rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502086#M105287</link>
      <description>&lt;P&gt;The service configuration limits which ports the applications are allowed to use&lt;/P&gt;
&lt;P&gt;Setting tcp-22 in the services limits ALL applications to only be allowed through tcp:22 (so DNS will need to use TCP 22 instead of UDP 53)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if DNS needs to be allowed too, you'll need to add udp53 to the services&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2022 08:49:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502086#M105287</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2022-06-09T08:49:48Z</dc:date>
    </item>
    <item>
      <title>Re: Application and services in security policy rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502280#M105322</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;While there maybe a reason for restricting the application traffic, I would break these out into their own separate policies. This way you have tighter control over applications and which ports they can/should use.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2022 14:59:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502280#M105322</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-06-09T14:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: Application and services in security policy rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502452#M105329</link>
      <description>&lt;P&gt;Hi Reaper,&lt;/P&gt;&lt;P&gt;That makes sense but just confirming SSH traffic will also be blocked in the case as I have not allowed SSH in application section?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please confirm&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2022 23:09:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502452#M105329</guid>
      <dc:creator>jatin.singh06</dc:creator>
      <dc:date>2022-06-09T23:09:37Z</dc:date>
    </item>
    <item>
      <title>Re: Application and services in security policy rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502595#M105341</link>
      <description>&lt;P&gt;&lt;SPAN&gt;break application&amp;nbsp; out into their own separate security policies and define whatever port you desire to use except you want all the app on the same port 22 and also define udp port.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 12:21:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502595#M105341</guid>
      <dc:creator>S_Alad</dc:creator>
      <dc:date>2022-06-10T12:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: Application and services in security policy rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502765#M105356</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Correct, you will need to have ssh in the application field to allow the traffic. You will not need a 'service'/port since that is implied in the application.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://applipedia.paloaltonetworks.com/" target="_blank"&gt;https://applipedia.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_0-1654881751380.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/41743i0D934E15F00DDED5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_0-1654881751380.png" alt="OtakarKlier_0-1654881751380.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 17:22:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502765#M105356</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-06-10T17:22:47Z</dc:date>
    </item>
    <item>
      <title>Re: Application and services in security policy rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502829#M105361</link>
      <description>&lt;P&gt;It would be nice if you could get away with an "and"&amp;nbsp; for app default- AND any port you specify in the rule.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 20:11:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502829#M105361</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2022-06-10T20:11:49Z</dc:date>
    </item>
    <item>
      <title>Re: Application and services in security policy rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502834#M105362</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;You absolutely can. However the point with the applications is that you dont have to. So instead of a policy that is like:&lt;/P&gt;
&lt;P&gt;application = ssh and service = 22/tcp, you can just put in application = ssh.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thats really it. The firewall knows and can see ssh and knows its only allowed on port 22/tcp by default.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 20:14:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502834#M105362</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-06-10T20:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: Application and services in security policy rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502848#M105367</link>
      <description>&lt;P&gt;I was under the impression that one rule was either app-default OR you pick the service.&lt;BR /&gt;&lt;BR /&gt;Like&lt;BR /&gt;app=ssh&lt;BR /&gt;&lt;BR /&gt;service&lt;BR /&gt;app-default OR tcp/22&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 20:32:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502848#M105367</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2022-06-10T20:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: Application and services in security policy rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502853#M105370</link>
      <description>&lt;P&gt;So that means.&lt;/P&gt;&lt;P&gt;Lets says I allowed 5 applications in my rule 1 with "application-default"&lt;/P&gt;&lt;P&gt;The traffic from that rule would be allowed on all standard ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I have another non standard port to allow.&lt;/P&gt;&lt;P&gt;So I have to make another rule and allow ALL apps on that TCP- NON-STANDARD&amp;nbsp; port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does'it not open up all application traffic on that port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would'nt it be better if I use the non standard port in same rule 1 and somehow palo allows my 5 applications on their standard ports and also the non standard I added in services section.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That way I can have the traffic going to non standard port allowed and also applications to standard ports allowed in same rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That poses less secuirty risk rather than allowing all apps on that non standard port in a new rule?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 20:45:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502853#M105370</guid>
      <dc:creator>jatin.singh06</dc:creator>
      <dc:date>2022-06-10T20:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: Application and services in security policy rules</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502855#M105371</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Let me try this: Lets say you want to allow the following applications:&lt;/P&gt;
&lt;P&gt;ssl, web-browsing, and dns and dont put in any service/ports. The firewall will allow traffic that is sees as DNS only on port 53, web-browsing only on port 80 and ssl only on port 443. If DNS tries to use any other port, it will be blocked.&lt;/P&gt;
&lt;P&gt;if you put in a policy that allows applications:&amp;nbsp;ssl, web-browsing, and dns and ports 53, 80, 443. Then the firewall will allow any of those applications over any of those ports, ie DNS over 443, 80, 53.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So by not using a specific service/port, you are making your security policy that much stronger. If you want to allow an application say DNS over port 443, you will need to have a special policy that allows that. The firewall reads policies top down, left to right. Once it finds a match, thats what it will use.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that makes sense.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 20:52:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-and-services-in-security-policy-rules/m-p/502855#M105371</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-06-10T20:52:22Z</dc:date>
    </item>
  </channel>
</rss>

