<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Application Dependency Warnings in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/application-dependency-warnings/m-p/24226#M17659</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have begun the process of globally allowing some applications for the entire enterprise.&amp;nbsp; At this point, these are (fairly) innocuous applications which are largely dependent on web-browsing / ssl.&amp;nbsp; Two questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; When verifying if a dependent application is available, does the firewall check the policy from the top down or just rules below the one you're creating?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; I think part of the issue I'm running into is something that is discussed here: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-7040"&gt;Application Dependency Warnings with Allowed Enabler Application&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have rules up around 20 - 30 that are my URL Filtering rules.&amp;nbsp; So, certain user groups are allowed to certain URL categories via web-browsing (on "any" service).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, down around rule 150 or so, I have a rule that says, "Globally Allowed Applications" - in here I have a few apps like 'ms-update' and 'flash'.&amp;nbsp; However, once I pushed policy, I'm being told (for example) that:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Application 'flash' requires 'web-browsing' be allowed, but 'web-browsing' is denied in rule "Drop All".&amp;nbsp; &lt;EM&gt;Technically&lt;/EM&gt; 'web-browsing' is allowed above.&amp;nbsp; I'm not really a fan of having to allow the applications (especially web-browsing or SSL) globally as this negates our URL filtering policy.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone else run into this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 03 Oct 2014 17:52:56 GMT</pubDate>
    <dc:creator>mrsoldner</dc:creator>
    <dc:date>2014-10-03T17:52:56Z</dc:date>
    <item>
      <title>Application Dependency Warnings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dependency-warnings/m-p/24226#M17659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have begun the process of globally allowing some applications for the entire enterprise.&amp;nbsp; At this point, these are (fairly) innocuous applications which are largely dependent on web-browsing / ssl.&amp;nbsp; Two questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; When verifying if a dependent application is available, does the firewall check the policy from the top down or just rules below the one you're creating?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; I think part of the issue I'm running into is something that is discussed here: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-7040"&gt;Application Dependency Warnings with Allowed Enabler Application&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have rules up around 20 - 30 that are my URL Filtering rules.&amp;nbsp; So, certain user groups are allowed to certain URL categories via web-browsing (on "any" service).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, down around rule 150 or so, I have a rule that says, "Globally Allowed Applications" - in here I have a few apps like 'ms-update' and 'flash'.&amp;nbsp; However, once I pushed policy, I'm being told (for example) that:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Application 'flash' requires 'web-browsing' be allowed, but 'web-browsing' is denied in rule "Drop All".&amp;nbsp; &lt;EM&gt;Technically&lt;/EM&gt; 'web-browsing' is allowed above.&amp;nbsp; I'm not really a fan of having to allow the applications (especially web-browsing or SSL) globally as this negates our URL filtering policy.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone else run into this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Oct 2014 17:52:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dependency-warnings/m-p/24226#M17659</guid>
      <dc:creator>mrsoldner</dc:creator>
      <dc:date>2014-10-03T17:52:56Z</dc:date>
    </item>
    <item>
      <title>Re: Application Dependency Warnings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dependency-warnings/m-p/24227#M17660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mrsoldner,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand that "web-browsing"{ is allowed in above rules and not in rule 150 where you have allowed "flash". Where flash depends on "web browsing".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it might be Palo Alto Networks internal thing, were dependent application should be allowed in same rule. So, in traffic logging they can track related log.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again its just a speculation. Even I am waiting for much better explanation on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Oct 2014 18:04:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dependency-warnings/m-p/24227#M17660</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-10-03T18:04:45Z</dc:date>
    </item>
    <item>
      <title>Re: Application Dependency Warnings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dependency-warnings/m-p/24228#M17661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) if there is a dependent application then firewall will check from top-down whether dependent application is being allowed as mentioned in the document.&lt;/P&gt;&lt;P&gt;2) My recommendation is to allow web-browsing in policy 150 and apply url filtering profile. Since policies 20-30 are user restricted policies eventhough you allow web browsing in those, rule 150 still need an explicit dependent application allow policy to avoid commit warnings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hari&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 22:53:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dependency-warnings/m-p/24228#M17661</guid>
      <dc:creator>hyadavalli</dc:creator>
      <dc:date>2014-10-06T22:53:47Z</dc:date>
    </item>
    <item>
      <title>Re: Application Dependency Warnings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-dependency-warnings/m-p/24229#M17662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;A _jive_internal="true" class="jiveTT-hover-user jive-username-link" data-avatarid="-1" data-externalid="" data-presence="null" data-userid="21363" data-username="mrsoldner" href="https://live.paloaltonetworks.com/people/mrsoldner" style="padding: 0 3px 0 0; font-weight: inherit; font-style: inherit; font-size: 1.1em; font-family: inherit; color: #006595;"&gt;mrsoldner&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12px;"&gt;There are few enabler applications that are allowed implicitly, meaning, you don't have to add them in the policy to allow them explicitly. I believe web-browsing and SSL fall under this list. This implicit allow was something that was introduced in PAN-OS 5.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12px;"&gt;Below document might come in handy:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-6900"&gt;How to Check if an Application Needs to have Explicitly Allowed Dependency Apps&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am looking for the list of implicitly allowed enabler applications. If I find anything related, i will update this post&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2014 23:13:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-dependency-warnings/m-p/24229#M17662</guid>
      <dc:creator>tshiv</dc:creator>
      <dc:date>2014-10-06T23:13:56Z</dc:date>
    </item>
  </channel>
</rss>

