<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best Practices for Application Policies? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23379#M17038</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good catch. What you have found are two examples of applications that  &lt;/P&gt;&lt;P&gt;leverage our heuristic engine for identification. These applications  &lt;/P&gt;&lt;P&gt;can utilize proprietary encryption and in some cases, we are not able  &lt;/P&gt;&lt;P&gt;to identify them based on signature. In these cases, the heuristic  &lt;/P&gt;&lt;P&gt;engine will watch for behavior patterns and identify the application  &lt;/P&gt;&lt;P&gt;based on that. The heuristic engine kicks in when we have no positive  &lt;/P&gt;&lt;P&gt;match based on known signatures (i.e. when the application is not  &lt;/P&gt;&lt;P&gt;identified and shows up as unknown-tcp/udp). This is the reason for  &lt;/P&gt;&lt;P&gt;unknown-tcp showing up as a dependency when you commit a policy  &lt;/P&gt;&lt;P&gt;allowing bittorrent or share-p2p. If you didn't allow unknowns, the  &lt;/P&gt;&lt;P&gt;portion of those apps that use proprietary encryption would not be  &lt;/P&gt;&lt;P&gt;identified or allowed. So, my initial response was incorrect, there  &lt;/P&gt;&lt;P&gt;are a handful of apps that will get identified by the heuristic engine  &lt;/P&gt;&lt;P&gt;if we have declared them as unknown based on signature matches. If the  &lt;/P&gt;&lt;P&gt;heuristic match does not happen right away, allowing unknown traffic  &lt;/P&gt;&lt;P&gt;would be required for proper identification assuming you were wanting  &lt;/P&gt;&lt;P&gt;to explicitly allow these applications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 26 Oct 2009 17:45:40 GMT</pubDate>
    <dc:creator>mjacobsen</dc:creator>
    <dc:date>2009-10-26T17:45:40Z</dc:date>
    <item>
      <title>Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23373#M17032</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was wondering if there is a best practices document for setting up a policy to control particular applications. I've already dug through the Skype tech document which tells to enable unknown applications. Are there any other applications that work better or require unknown applications to be enabled? To take it further, is there an application dependency list available? For example when creating a policy allowing bittorrent traffic out, the firewall prompts during the verification process that web-browsing should be enabled for bittorrent. Is there a document that will say “X application requires Y application to work correctly”. I would prefer not to find out during the verification process.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- FJ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Oct 2009 19:31:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23373#M17032</guid>
      <dc:creator>nugentec</dc:creator>
      <dc:date>2009-10-07T19:31:35Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23374#M17033</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello Frank,&lt;/P&gt;&lt;P&gt;currently we do not have such a document as this, but this a great idea. I am currently pursuing the possibilities of producing such a document. This document would need to be live as we are continually updating application signatures with each content release.&lt;/P&gt;&lt;P&gt;Also a case has been created for this issue for tracking. It is case 7836. You can call into support and refer to it to get updates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Stephen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Oct 2009 21:40:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23374#M17033</guid>
      <dc:creator>pantac</dc:creator>
      <dc:date>2009-10-09T21:40:25Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23375#M17034</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As a clarification, from our testing with current software and content, we no longer see any issue with Skype call quality when not allowing unknown traffic. We will work to get the tech note updated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the general topic of application dependencies, the system will show you these dependencies at the time of commit. We are looking at enhancing the policy workflow to make those dependencies more apparent when adding applications to a rule. Hopefully this will feel more natural than the current warnings. Let us know if you have thoughts about better ways to highlight these dependencies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Oct 2009 05:27:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23375#M17034</guid>
      <dc:creator>mjacobsen</dc:creator>
      <dc:date>2009-10-14T05:27:46Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23376#M17035</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for getting back to me. For the time being, do you have a list of applications that either require or benefit from allowing unknown-tcp, *-udp, *-p2p? Or in other terms, would creating a policy which allows the "unknown group" traverse the firewall, would it lead to the firewall identifying more applications? Are there any applications that cannot be identified without the "unknown group" being enabled? I need to make a case to my manager to whether or not we should allow the "unknown group" and having a list of applications that benefit from it would help my case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as application dependencies, I would prefer to find out either while I'm editing the security rule base or beforehand from a document. I don't care to wait during the commit process. For my team and I its a personal preference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate your help on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FJ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Oct 2009 15:21:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23376#M17035</guid>
      <dc:creator>nugentec</dc:creator>
      <dc:date>2009-10-14T15:21:01Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23377#M17036</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The key with unknown-tcp and unknown-udp is that they indicate that we  &lt;/P&gt;&lt;P&gt;are seeing an application we do not recognize. If you have an  &lt;/P&gt;&lt;P&gt;application in use that falls into this bucket, then allowing unknown- &lt;/P&gt;&lt;P&gt;tcp or unknown-udp is important (assuming it is an application you  &lt;/P&gt;&lt;P&gt;want going in and out). There shouldn't be any applications that we  &lt;/P&gt;&lt;P&gt;have App-IDs for that benefit from allowing unknown traffic. For the  &lt;/P&gt;&lt;P&gt;applications that we do not recognize, you have a few options. You can  &lt;/P&gt;&lt;P&gt;submit the application to us and we will add an App-ID for it. If it  &lt;/P&gt;&lt;P&gt;is an HTTP-based application you can write your own custom App-ID for  &lt;/P&gt;&lt;P&gt;it. If it is served on a static port or IP, you can create an  &lt;/P&gt;&lt;P&gt;Application Override rule for it. Finally, you can allow the unknown  &lt;/P&gt;&lt;P&gt;traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general, if you have an open policy where you allow most  &lt;/P&gt;&lt;P&gt;applications, then allowing the unknowns probably makes sense. If you  &lt;/P&gt;&lt;P&gt;are trying to create a restrictive policy where you only allow a small  &lt;/P&gt;&lt;P&gt;subset of applications, then blocking unknown applications is probably  &lt;/P&gt;&lt;P&gt;a better fit. In many environments, we see customers starting out  &lt;/P&gt;&lt;P&gt;allowing unknowns and then doing a little investigation on the types  &lt;/P&gt;&lt;P&gt;of flows that are showing up as unknown to determine which of the  &lt;/P&gt;&lt;P&gt;above options should be chosen for dealing with those flows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your feedback on the dependencies. We will continue down  &lt;/P&gt;&lt;P&gt;the path of figuring out a way to make them apparent within the  &lt;/P&gt;&lt;P&gt;context of rulebase edits.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Oct 2009 15:36:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23377#M17036</guid>
      <dc:creator>mjacobsen</dc:creator>
      <dc:date>2009-10-14T15:36:34Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23378#M17037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your response Mike. It's what I need to help my manager make a few key decisions. However we are hung up on one of your responses. You stated "There shouldn't be any applications that we have App-IDs for that benefit from allowing unknown traffic." If this is the case, why is unknown-tcp a required application dependancy for applications like share-p2p and bittorrent? If the "unknown application group" is not used to identifiy applications like share-p2p, why is it a dependancy? Can you please clear this up for me?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FJ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Oct 2009 15:34:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23378#M17037</guid>
      <dc:creator>nugentec</dc:creator>
      <dc:date>2009-10-26T15:34:31Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23379#M17038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good catch. What you have found are two examples of applications that  &lt;/P&gt;&lt;P&gt;leverage our heuristic engine for identification. These applications  &lt;/P&gt;&lt;P&gt;can utilize proprietary encryption and in some cases, we are not able  &lt;/P&gt;&lt;P&gt;to identify them based on signature. In these cases, the heuristic  &lt;/P&gt;&lt;P&gt;engine will watch for behavior patterns and identify the application  &lt;/P&gt;&lt;P&gt;based on that. The heuristic engine kicks in when we have no positive  &lt;/P&gt;&lt;P&gt;match based on known signatures (i.e. when the application is not  &lt;/P&gt;&lt;P&gt;identified and shows up as unknown-tcp/udp). This is the reason for  &lt;/P&gt;&lt;P&gt;unknown-tcp showing up as a dependency when you commit a policy  &lt;/P&gt;&lt;P&gt;allowing bittorrent or share-p2p. If you didn't allow unknowns, the  &lt;/P&gt;&lt;P&gt;portion of those apps that use proprietary encryption would not be  &lt;/P&gt;&lt;P&gt;identified or allowed. So, my initial response was incorrect, there  &lt;/P&gt;&lt;P&gt;are a handful of apps that will get identified by the heuristic engine  &lt;/P&gt;&lt;P&gt;if we have declared them as unknown based on signature matches. If the  &lt;/P&gt;&lt;P&gt;heuristic match does not happen right away, allowing unknown traffic  &lt;/P&gt;&lt;P&gt;would be required for proper identification assuming you were wanting  &lt;/P&gt;&lt;P&gt;to explicitly allow these applications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Oct 2009 17:45:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23379#M17038</guid>
      <dc:creator>mjacobsen</dc:creator>
      <dc:date>2009-10-26T17:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23380#M17039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Another example is if you only want to allow browser-based im-services and add that as an allowed subcategory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;During commit it will bring you a warning that "msn2go" also needs "http" to be functioning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However if I fullfill the request of the warning (and add "http" to the allowed application list) that would mean that I will allow ALL http based applications (which I dont want).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An expensive workaround would be to try to identify all applications which relations to http and put them on a block before the http + im-services allow row.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wouldnt it be possible to extend the appid for msn2go to include whatever from http it needs to be functioning. But so it at the same time will block other http requests which isnt msn2go based?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same would of course apply to bittorrent and the other appid's with dependencies...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Feb 2010 16:19:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23380#M17039</guid>
      <dc:creator>rps</dc:creator>
      <dc:date>2010-02-26T16:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23381#M17040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Allowing web-browsing does not allow all HTTP-based applications. Any applications that have specific App-IDs will need to be called out in addition to web-browsing. So in your example, you would not need the block rule ahead of the im-services rule. A rule that allows web-browsing and im-services would only allow unclassified HTTP traffic and specific IM apps covered in your im-services group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Feb 2010 16:27:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23381#M17040</guid>
      <dc:creator>mjacobsen</dc:creator>
      <dc:date>2010-02-26T16:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23382#M17041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes but when I allow the sub category "im-services" (which is part of "browser-based" category) and try to commit then the commit is successful but I get a warning (within the popup of the commit window) that "msn2go" wants "http" before it can function (and as I interpret it this means that all applications within "im-services" are now allowed except "msn2go" because I didnt add "http" as application, however if I would add "http" (as the warning tells me to do) then it would be a bit to wide opening through the firewall).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Feb 2010 16:33:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23382#M17041</guid>
      <dc:creator>rps</dc:creator>
      <dc:date>2010-02-26T16:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23383#M17042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First, it is not just msn2go that requires http (or actually the app called web-browsing). The commit checking just presents the first issue is runs into. In this case, all of the apps in your browser-based IM group will require web-browsing in order to function. Without this, the HTTP decoding function does not occur and no HTTP-based applications will be allowed. In order for any of the HTTP-based applications to be allowed, there must be a rule allowing web-browsing. As I mentioned, this does not allow any otherwise classified App-IDs, only unclassified web-browsing traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Feb 2010 16:58:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23383#M17042</guid>
      <dc:creator>mjacobsen</dc:creator>
      <dc:date>2010-02-26T16:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23384#M17043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm I will verify this on monday because im pretty sure that "web-browsing" is already allowed in the same application filter that have selected the im-group, and yet during commit I get a warning that "msn2go" needs "http" to function.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is with 3.0.6 with current of today (26 feb) threat/app db (170-something if im not mistaken).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Feb 2010 17:36:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23384#M17043</guid>
      <dc:creator>rps</dc:creator>
      <dc:date>2010-02-26T17:36:56Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23385#M17044</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As Mike stated, you need to allow the "web-browsing" application for web-based applications to function.&amp;nbsp; This allows the HTTP decoder to activate.&amp;nbsp; This only allows generic HTTP web-browsing and not other more-specific web applications we have signatures for.&amp;nbsp; You can further control the generic "web-browsing" application via URL filtering profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to enable web-based IM you might want to create a policy that includes the IM and web-browsing applications, then add a URL filtering profile to that rule to block most categories of generic web-browsing that doesn't fit into an existing web application signature.&amp;nbsp; You might need to tweak the URL filtering profile a bit and make some exceptions depending on how restrictive you make it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Feb 2010 18:58:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23385#M17044</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2010-02-26T18:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23386#M17045</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"web-browsing" is already allowed but it doesnt seem to work as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created an application filter named "SURF_browser-based" containing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Technologies:&lt;BR /&gt;browser-based&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subcategories:&lt;BR /&gt;email&lt;BR /&gt;erp-crm&lt;BR /&gt;file-sharing&lt;BR /&gt;general-business&lt;BR /&gt;instant-messaging&lt;BR /&gt;internet-utility&lt;BR /&gt;office-programs&lt;BR /&gt;social-networking&lt;BR /&gt;storage-backup&lt;BR /&gt;web-posting&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and assign it to a policy to allow the applications which are contained in the above subcategories (note how instant-messaging is included along with web-browsing which is in internet-utility if im not mistaken).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After commit the output is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * device: Rule 'SURF' application dependency warning:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'zimbra' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'zimbra' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'zimbra' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'zimbra' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'zimbra' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'zimbra' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'mobile-me' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'mobile-me' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'mobile-me' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'mobile-me' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'mobile-me' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'mobile-me' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'msn2go' requires 'http' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'msn2go' requires 'http' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'msn2go' requires 'http' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'msn2go' requires 'http' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'msn2go' requires 'http' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'msn2go' requires 'http' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'bebo' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'bebo' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'bebo' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'bebo' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'bebo' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'bebo' requires 'http-proxy' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'aim-express' requires 'aim' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'aim-express' requires 'aim' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'aim-express' requires 'aim' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'aim-express' requires 'aim' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'aim-express' requires 'aim' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'aim-express' requires 'aim' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'woome' requires 'rtmp' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'woome' requires 'rtmp' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'woome' requires 'rtmp' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'woome' requires 'rtmp' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'woome' requires 'rtmp' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'woome' requires 'rtmp' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'bigupload' requires 'ftp' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'bigupload' requires 'ftp' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'bigupload' requires 'ftp' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'bigupload' requires 'ftp' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'bigupload' requires 'ftp' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - Application 'bigupload' requires 'ftp' allowed in the policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * Configuration committed successfully&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note the warning regarding msn2go which I feel is a bit odd since both web-browsing and msn2go are allowed...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Mar 2010 12:20:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23386#M17045</guid>
      <dc:creator>rps</dc:creator>
      <dc:date>2010-03-04T12:20:01Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23387#M17046</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RPS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will look into this issue on the support side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have an active support contract can you send an email to &lt;A href="mailto:support@paloaltonetworks.com"&gt;support@paloaltonetworks.com&lt;/A&gt; and include the following information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pan device serial number&lt;/P&gt;&lt;P&gt;PanOS version installed&lt;/P&gt;&lt;P&gt;Content database installed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will open a case to investigate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Mar 2010 12:40:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23387#M17046</guid>
      <dc:creator>pantac</dc:creator>
      <dc:date>2010-03-04T12:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23388#M17047</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mail sent &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Mar 2010 17:05:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23388#M17047</guid>
      <dc:creator>rps</dc:creator>
      <dc:date>2010-03-04T17:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23389#M17048</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi I am new at this board.&lt;/P&gt;&lt;P&gt;I have the same prablem with after submitting&amp;nbsp; policy like:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;# Application 'http-video' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'uusee' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'move-networks' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'babelgum' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'peercast' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'myspace-video' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'tvu' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'ppstream' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'tvants' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'photobucket' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'meabox' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'meabox' requires 'fs2you' allowed in the policy&lt;BR /&gt;# - Application 'dailymotion' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'limelight' requires 'http-proxy' allowed in the policy&lt;BR /&gt;# - Application 'limelight' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'pplive' requires 'pp-accelerator' allowed in the policy&lt;BR /&gt;# - Application 'pplive' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'veetle' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'google-picasa' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'ustream' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'bbc-iplayer' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'mogulus' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'ooyala' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'justin.tv' requires 'web-browsing' allowed in the policy&lt;BR /&gt;# - Application 'livestation' requires 'web-browsing' allowed in the policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; and many many more. It happend a few days ago but I didn't do anything special in my policy rules.&lt;/P&gt;&lt;P&gt;Can you tell me if you solved this problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow-x: hidden; overflow-y: hidden;"&gt;﻿&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Apr 2011 09:07:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23389#M17048</guid>
      <dc:creator>pawel_serwatko</dc:creator>
      <dc:date>2011-04-11T09:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23390#M17049</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What Software version are you running? 3.0.10 is the last release of 3.0 since it is now "End of life". 3.1.8 is the most current verison&amp;nbsp; in the 3.1 family as of this post.&amp;nbsp; The message is just a warning and should not cause any problems as long as the dependenies are allowed somewhere in the policy list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you were to create a rulethat allows Facebook and web-browsing at the top, this rule would allow all web browsing and rules farther down the list would never get used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally speaking, "web-browsing" is a very large net that catches all HTTP traffic. If you want to treat Facebook or gmail or dropbox differently you would need one rule for each and then a rule allowing "web-browsing" at the end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve Krall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Apr 2011 19:03:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23390#M17049</guid>
      <dc:creator>skrall</dc:creator>
      <dc:date>2011-04-14T19:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23391#M17050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great. So now this is buried in a support case and no one else gets some insight. What was the outcome of this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Nov 2012 18:04:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23391#M17050</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2012-11-09T18:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Application Policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23392#M17051</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess the appid's regarding these findings were updated (but I agree would be nice with a reply from a PA representative on what happend in these particular cases).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today I would guess installing PANOS 5.0 (or newer) is the way to go to deal with dependencies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because one of the new features with PANOS 5.0 is that it will handle dependencies when needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example allowing x number of packets for a dependency appid and unless the traffic is being identified as the appid you specified (within this range of x number of packets or so) the session will be closed/dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The part to worry about is how many packets will be allowed "under the radar" (and how to notify the admin what he/she is about to do when creating such security policy).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today if you wish to allow facebook you must also statically allow web-browsing (if im not mistaken).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This doesnt mean that all http traffic are allowed (because other appids like youtube etc will trigger if identified since a session can only have one appid at a time) but it means that all http traffic which doesnt match any known appid will be allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is of course somewhat bad (in most cases) and you need to add a custom url-filter to limit the http requests to only *.facebook.com (and which other domains facebook are using).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now with PANOS 5.0 (as I understand it) it will work if you just allow facebook and nothing more (still using url filtering is healthy but if we stick to appid's for now &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When facebook is allowed in PANOS 5.0 it will in the background allow web-browsing but only for x number of packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is of course way better than in PANOS 4.1 and older where you had to statically allow web-browsing for all future but still I think education of the admins configuring PA-devices will be needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case it would be great if PA could provide us (the customers &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; with a dependency list along with the limit list (like if I allow facebook, how many web-browsing packets will be allowed) - because as I see this (currently) this might open up for a logical evasion techniques (the admin thinks only facebook is allowed but this custom botnet will still be able to phone home 2 packets per session or such).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Nov 2012 09:58:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practices-for-application-policies/m-p/23392#M17051</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-11-10T09:58:08Z</dc:date>
    </item>
  </channel>
</rss>

