<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking Torrent/P2P Connections using app ID. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-torrent-p2p-connections-using-app-id/m-p/1235806#M124940</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1529646183"&gt;@S.Jayathunge&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You would only want to have the two app-ids that you are looking to block [ bittorrent bittorrent-sync ] and you don't include web-browsing in the deny rule. You generally don't want to include any depends-on listing in a deny rule, you would only want to include them if you're attempting to permit the traffic&amp;nbsp;&lt;EM&gt;if&amp;nbsp;&lt;/EM&gt;they aren't otherwise accounted for.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would recommend reviewing your URL categories that you are allowing and think about creating an application or just application groups that you attempt to maintain for blocking access to certain applications.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As an example, we have a list of applications that we deny externally for remote access applications (IE: Chrome Remote Desktop, Teamviewer, RDP, etc.) that we wouldn't want to allow externally. You might create an application-filter for encrypted network tunnels as another example excluding things like SSL that you wouldn't want to necessarily block.&lt;/P&gt;
&lt;P&gt;You just want to be careful and actually validate any dynamic filters that you look at configuring. While you likely want to utilize application filters and URL categorization so you don't need to constantly update your list, you also want to be at least a bit conservative in rolling it out. That way you aren't suddenly blocking access to something legitimate that you haven't thought about.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Aug 2025 19:18:13 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2025-08-11T19:18:13Z</dc:date>
    <item>
      <title>Blocking Torrent/P2P Connections using app ID.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-torrent-p2p-connections-using-app-id/m-p/1235805#M124939</link>
      <description>&lt;P&gt;Hi Palo Alto Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope everyone’s having a great day! We’re working to enhance our network’s security by blocking torrent and other risky P2P communications. I’ve set up a deny policy using the “bittorrent” and “bittorrent‑sync” App‑IDs, but I noticed these require the “web‑browsing” App‑ID to function. When I include “web‑browsing” in the policy and commit it, web browsing traffic gets blocked for users—clearly not what we want.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SJayathunge_0-1754938027865.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68826iC478D80AB4D450AC/image-size/large?v=v2&amp;amp;px=999" role="button" title="SJayathunge_0-1754938027865.png" alt="SJayathunge_0-1754938027865.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I’d really appreciate any insights on:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;How can I configure the policy so that “bittorrent” and “bittorrent‑sync” are blocked without impacting legitimate web browsing?&lt;/LI&gt;
&lt;LI&gt;Is it possible for “bittorrent” and “bittorrent‑sync” App‑IDs to work independently—without their “web‑browsing” dependency?&lt;/LI&gt;
&lt;LI&gt;Are there additional recommended App‑IDs to include when blocking P2P, malicious, or illegal traffic more comprehensively?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance for your advice.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2025 18:48:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-torrent-p2p-connections-using-app-id/m-p/1235805#M124939</guid>
      <dc:creator>S.Jayathunge</dc:creator>
      <dc:date>2025-08-11T18:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Torrent/P2P Connections using app ID.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-torrent-p2p-connections-using-app-id/m-p/1235806#M124940</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1529646183"&gt;@S.Jayathunge&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You would only want to have the two app-ids that you are looking to block [ bittorrent bittorrent-sync ] and you don't include web-browsing in the deny rule. You generally don't want to include any depends-on listing in a deny rule, you would only want to include them if you're attempting to permit the traffic&amp;nbsp;&lt;EM&gt;if&amp;nbsp;&lt;/EM&gt;they aren't otherwise accounted for.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would recommend reviewing your URL categories that you are allowing and think about creating an application or just application groups that you attempt to maintain for blocking access to certain applications.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As an example, we have a list of applications that we deny externally for remote access applications (IE: Chrome Remote Desktop, Teamviewer, RDP, etc.) that we wouldn't want to allow externally. You might create an application-filter for encrypted network tunnels as another example excluding things like SSL that you wouldn't want to necessarily block.&lt;/P&gt;
&lt;P&gt;You just want to be careful and actually validate any dynamic filters that you look at configuring. While you likely want to utilize application filters and URL categorization so you don't need to constantly update your list, you also want to be at least a bit conservative in rolling it out. That way you aren't suddenly blocking access to something legitimate that you haven't thought about.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2025 19:18:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-torrent-p2p-connections-using-app-id/m-p/1235806#M124940</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-08-11T19:18:13Z</dc:date>
    </item>
  </channel>
</rss>

