<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I allow udp port 33001? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21795#M15922</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;By default, PAN will only generate logs for traffic that matches a defined security policy.&amp;nbsp; If traffic from one zone to another is not explicity allowed by a security policy,&amp;nbsp; it is blocked by an implicit deny policy (not visible in security policies) and these denys will not be logged in the traffic logs.&amp;nbsp; For troubleshooting purposes, we can setup a cleanup rule to log traffic that would be implicitly denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The cleanup rule would look like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source Zone: Trusted&lt;/P&gt;&lt;P&gt;Source Address: any&lt;/P&gt;&lt;P&gt;Destination: Untrusted&lt;/P&gt;&lt;P&gt;Destination Address: any&lt;/P&gt;&lt;P&gt;Application: any&lt;/P&gt;&lt;P&gt;Service: any&lt;/P&gt;&lt;P&gt;Action: Deny&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure that the cleanup rule is at the bottom of your security policies.&amp;nbsp; Security policies are read from Top to Bottom.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Once changes have been committed, you can check the traffic logs under Monitor-&amp;gt; Logs-&amp;gt; Traffic.&amp;nbsp; From there you can click on the source IP address and filter the logs based on it.&amp;nbsp; This would show us if any traffic from the Aspera client is being denied.&amp;nbsp; You can then modify the security policies to allow the traffic being denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ahsan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Apr 2012 02:14:35 GMT</pubDate>
    <dc:creator>akhan</dc:creator>
    <dc:date>2012-04-12T02:14:35Z</dc:date>
    <item>
      <title>How do I allow udp port 33001?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21790#M15917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have encountered an issue where a downloaded client installed on Internet Explorer called Aspera client for downloading video content experienced an error.It states to check the UDP port and firewall based on code 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since this is application based (HTTP), where is the most effective place to allow and create the rule for the client to download?&lt;/P&gt;&lt;P&gt;Do I create a "security" rule or create a "application overide"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to be able to allow a source zone or ip (trusted) to allow traffic connections to an ip (untrusted zone) on port udp 33001.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any insights?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;BTW, this site is &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://asperasoft.com/en/support/troubleshooting_3/2_Connect_Timeout_4"&gt;http://asperasoft.com/en/support/troubleshooting_3/2_Connect_Timeout_4&lt;/A&gt;&lt;SPAN&gt; is where the support is based. I didn't see the application listed either in the PA firewall applications listing either.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2012 03:10:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21790#M15917</guid>
      <dc:creator>robert_smith</dc:creator>
      <dc:date>2012-04-10T03:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: How do I allow udp port 33001?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21791#M15918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;From the description of the error message, it seems that the control connection over TCP is established, but the data connection, using UDP 33001 cannot be&amp;nbsp;&amp;nbsp; established.&amp;nbsp; To resolve this, you first need to create a service under Objects -&amp;gt; Services.&amp;nbsp; Create a service called "Aspera" for protocol UDP and destination port 33001 (do not define a source port as it will probably be random).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then create a security rule under Policies -&amp;gt; Security like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source Zone: Trusted&lt;/P&gt;&lt;P&gt;Source Address: Define private source addresses you wish to allow through the firewall or set to "any" to allow everyone.&lt;/P&gt;&lt;P&gt;Destination: Untrusted&lt;/P&gt;&lt;P&gt;Destination Address: Any, or a specific Aspera IP address(s) if known.&lt;/P&gt;&lt;P&gt;Application: any&lt;/P&gt;&lt;P&gt;Service: Aspera&lt;/P&gt;&lt;P&gt;Action: Allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This rule should be placed above your deny rules.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ahsan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2012 04:25:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21791#M15918</guid>
      <dc:creator>akhan</dc:creator>
      <dc:date>2012-04-10T04:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: How do I allow udp port 33001?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21792#M15919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for answering my question....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've added both objects-- services and polcies--security rule to the FW, however after committing the changes and testing, it still doesn't seem to allow download of the video content. It just states "connecting" but no go.&lt;/P&gt;&lt;P&gt;I've included a snapshot of the event of what occurs when using Aspera webclient and the rules added.&lt;/P&gt;&lt;P&gt;Perhaps I've missed something?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2012 18:22:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21792#M15919</guid>
      <dc:creator>robert_smith</dc:creator>
      <dc:date>2012-04-10T18:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: How do I allow udp port 33001?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21793#M15920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You configurations look fine.&amp;nbsp; You might want to configure a clean-up (src zone: trust, dst zone: untrust, action deny) rule at the bottom of your security policies in order to determine what traffic is being blocked by PAN.&amp;nbsp; You can then filter the traffic logs based on your Source IP address to check if anything is being blocked.&amp;nbsp; I would also suggest checking your URL filtering logs and threat logs to make sure nothing is being denied there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ahsan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2012 23:38:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21793#M15920</guid>
      <dc:creator>akhan</dc:creator>
      <dc:date>2012-04-10T23:38:57Z</dc:date>
    </item>
    <item>
      <title>Re: How do I allow udp port 33001?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21794#M15921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for answering but what is a cleanup and how do I do this particular rule you mentioned?&lt;/P&gt;&lt;P&gt;Can you provide steps?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Apr 2012 02:02:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21794#M15921</guid>
      <dc:creator>robert_smith</dc:creator>
      <dc:date>2012-04-12T02:02:00Z</dc:date>
    </item>
    <item>
      <title>Re: How do I allow udp port 33001?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21795#M15922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;By default, PAN will only generate logs for traffic that matches a defined security policy.&amp;nbsp; If traffic from one zone to another is not explicity allowed by a security policy,&amp;nbsp; it is blocked by an implicit deny policy (not visible in security policies) and these denys will not be logged in the traffic logs.&amp;nbsp; For troubleshooting purposes, we can setup a cleanup rule to log traffic that would be implicitly denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The cleanup rule would look like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source Zone: Trusted&lt;/P&gt;&lt;P&gt;Source Address: any&lt;/P&gt;&lt;P&gt;Destination: Untrusted&lt;/P&gt;&lt;P&gt;Destination Address: any&lt;/P&gt;&lt;P&gt;Application: any&lt;/P&gt;&lt;P&gt;Service: any&lt;/P&gt;&lt;P&gt;Action: Deny&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure that the cleanup rule is at the bottom of your security policies.&amp;nbsp; Security policies are read from Top to Bottom.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Once changes have been committed, you can check the traffic logs under Monitor-&amp;gt; Logs-&amp;gt; Traffic.&amp;nbsp; From there you can click on the source IP address and filter the logs based on it.&amp;nbsp; This would show us if any traffic from the Aspera client is being denied.&amp;nbsp; You can then modify the security policies to allow the traffic being denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ahsan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Apr 2012 02:14:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21795#M15922</guid>
      <dc:creator>akhan</dc:creator>
      <dc:date>2012-04-12T02:14:35Z</dc:date>
    </item>
    <item>
      <title>Re: How do I allow udp port 33001?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21796#M15923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For debug-purposes it can be handy that you set your last cleanup rule to not only log on "session end" but also at "session start" (otherwise you would need to wait for the flow to finish before it shows up in the PAN logs).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually session end gives you trafficvolume and application (which session start cannot show) so in case you dont need to know these (since the deny should be on the first bad packet) you can set the cleanup rule to only log on "session start" instead of "session end" (otherwise your log volume will go up if you didnt do this before).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Apr 2012 07:47:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21796#M15923</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-04-12T07:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: How do I allow udp port 33001?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21797#M15924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your help in this matter.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Apr 2012 17:04:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-allow-udp-port-33001/m-p/21797#M15924</guid>
      <dc:creator>robert_smith</dc:creator>
      <dc:date>2012-04-12T17:04:51Z</dc:date>
    </item>
  </channel>
</rss>

