<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo-Alto and Cisco WAAS in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-cisco-waas/m-p/15997#M11685</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;According to Applipedia (&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://apps.paloaltonetworks.com/applipedia/"&gt;http://apps.paloaltonetworks.com/applipedia/&lt;/A&gt;&lt;SPAN&gt;) wccp exists as its own application:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;Description&lt;BR /&gt;Web Cache Communication Protocol (WCCP) is a Cisco-developed content-routing protocol that provides a mechanism to redirect traffic flows in real-time. It has built-in load balancing, scaling, fault tolerance, and service-assurance (failsafe) mechanisms. Cisco IOS Release 12.1 and later releases allow the use of either Version 1 (WCCPv1) or Version 2 (WCCPv2) of the protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Category&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; networking&lt;BR /&gt;Subcategory&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip-protocol&lt;BR /&gt;Risk&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&lt;BR /&gt;Standard Ports&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; udp/2048&lt;BR /&gt;Technology&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; network-protocol&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Evasive&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no&lt;BR /&gt;Excessive Bandwidth&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no&lt;BR /&gt;Prone to Misuse&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no&lt;BR /&gt;Capable of File Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; yes&lt;BR /&gt;Tunnels Other Applications&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; yes&lt;BR /&gt;Used by Malware&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no&lt;BR /&gt;Has Known Vulnerabilities&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; yes&lt;BR /&gt;Widely Used&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case this isnt enough in your case you can setup security rules that ignores the appid by setting appid:any and then just act on service configuration (PA name for tcp/udp-ports) along with src/dstip and so on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using appid:any can also be used in order to find out how PA will detect the flows. One problem might be that it at first is detected as wccp but later detected as the actual payload (lets assume its web-browsing or whatever) which means that you might end up with enabling both appid's for it to fully utilize application firewalling.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case your traffic isnt correctly detected you can contact your Sales Engineer or request app enhancement from the Apps and Threats Research Center:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.paloaltonetworks.com/researchcenter/tools/"&gt;http://www.paloaltonetworks.com/researchcenter/tools/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From there you can click on Submit an app and provide details there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Apr 2012 10:07:13 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-04-02T10:07:13Z</dc:date>
    <item>
      <title>Palo-Alto and Cisco WAAS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-cisco-waas/m-p/15996#M11684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are migrating to a Palo-Alto 4020 cluster from our PIX firewall cluster. I have a question regarding Cisco WAAS and WCCP v2 traffic. The front end router redirects to a Cisco WAE via WCCP services 61 and 62. Both WCCP and the WAE mark the original packet using the TCP options field and also change the packet sequence numbers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is how will the PA treat this traffic ? If it drops it, how can I configre the PA to allow it through ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2012 07:57:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-cisco-waas/m-p/15996#M11684</guid>
      <dc:creator>sfisher899</dc:creator>
      <dc:date>2012-04-02T07:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: Palo-Alto and Cisco WAAS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-cisco-waas/m-p/15997#M11685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;According to Applipedia (&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://apps.paloaltonetworks.com/applipedia/"&gt;http://apps.paloaltonetworks.com/applipedia/&lt;/A&gt;&lt;SPAN&gt;) wccp exists as its own application:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;Description&lt;BR /&gt;Web Cache Communication Protocol (WCCP) is a Cisco-developed content-routing protocol that provides a mechanism to redirect traffic flows in real-time. It has built-in load balancing, scaling, fault tolerance, and service-assurance (failsafe) mechanisms. Cisco IOS Release 12.1 and later releases allow the use of either Version 1 (WCCPv1) or Version 2 (WCCPv2) of the protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Category&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; networking&lt;BR /&gt;Subcategory&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip-protocol&lt;BR /&gt;Risk&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&lt;BR /&gt;Standard Ports&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; udp/2048&lt;BR /&gt;Technology&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; network-protocol&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Evasive&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no&lt;BR /&gt;Excessive Bandwidth&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no&lt;BR /&gt;Prone to Misuse&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no&lt;BR /&gt;Capable of File Transfer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; yes&lt;BR /&gt;Tunnels Other Applications&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; yes&lt;BR /&gt;Used by Malware&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no&lt;BR /&gt;Has Known Vulnerabilities&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; yes&lt;BR /&gt;Widely Used&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case this isnt enough in your case you can setup security rules that ignores the appid by setting appid:any and then just act on service configuration (PA name for tcp/udp-ports) along with src/dstip and so on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using appid:any can also be used in order to find out how PA will detect the flows. One problem might be that it at first is detected as wccp but later detected as the actual payload (lets assume its web-browsing or whatever) which means that you might end up with enabling both appid's for it to fully utilize application firewalling.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case your traffic isnt correctly detected you can contact your Sales Engineer or request app enhancement from the Apps and Threats Research Center:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.paloaltonetworks.com/researchcenter/tools/"&gt;http://www.paloaltonetworks.com/researchcenter/tools/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From there you can click on Submit an app and provide details there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2012 10:07:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-cisco-waas/m-p/15997#M11685</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-04-02T10:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: Palo-Alto and Cisco WAAS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-cisco-waas/m-p/15998#M11686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mikand,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perfect answer. Thank you very much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2012 11:11:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-and-cisco-waas/m-p/15998#M11686</guid>
      <dc:creator>sfisher899</dc:creator>
      <dc:date>2012-04-02T11:11:14Z</dc:date>
    </item>
  </channel>
</rss>

