<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ports unknown allowed in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29626#M21636</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you allowing the desired apps with service any or with service application default?&lt;/P&gt;&lt;P&gt;If you use application default (e.g. "from untrust" "to dmz" "app webbrowsing" "service application default" "action allow") you do not need another special deny rule.&lt;/P&gt;&lt;P&gt;But if you use "app webbrowsing" "service any" your config should be reviewed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Jun 2014 08:05:53 GMT</pubDate>
    <dc:creator>kbe</dc:creator>
    <dc:date>2014-06-10T08:05:53Z</dc:date>
    <item>
      <title>ports unknown allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29623#M21633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an application group that specifies the applications to allow from untrust to our DMZ. Mostly its just web browsing, ssl, pop and smtp. We are not allowing ms smb port 445 or Port 135 msrpc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our recent PCI security scans are telling us these ports are accessible. if I look in the monitor logs I can see msrpc (port 135) and ms-ds-smb (445) are being denied as expected. With that said, the firewall is allowing those ports if the application is seen as incomplete. This raises a concern. Why is the firewall allowing access through these ports especially if we have explicitly specified the applications to allow? Do I need to create another policy to deny these ports using an application override?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jun 2014 22:16:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29623#M21633</guid>
      <dc:creator>panfw_notify</dc:creator>
      <dc:date>2014-06-09T22:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: ports unknown allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29624#M21634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unless you explicitly deny ports 139 and 445, the firewall must analyze the traffic to see if web-browsing, ssl, pop, smtp, or any other application may be being accessed on those ports. Until the firewall can be sure (it may take a few packets), those must be allowed through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can deny those ports specifically, but then you'll also block legitimate traffic that you do want to allow which may be using ports 139 or 445.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jun 2014 22:24:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29624#M21634</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2014-06-09T22:24:21Z</dc:date>
    </item>
    <item>
      <title>Re: ports unknown allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29625#M21635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi gwesson we do want to deny those ports access to our webserver. I assume I would need to create a deny policy using an application override or can I use a service override? Right now we have one policy rule that specifies what applications are allowed from untrust to DMZ to our webserver. Can I just add the port denial on that same policy using a service?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jun 2014 22:44:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29625#M21635</guid>
      <dc:creator>panfw_notify</dc:creator>
      <dc:date>2014-06-09T22:44:57Z</dc:date>
    </item>
    <item>
      <title>Re: ports unknown allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29626#M21636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you allowing the desired apps with service any or with service application default?&lt;/P&gt;&lt;P&gt;If you use application default (e.g. "from untrust" "to dmz" "app webbrowsing" "service application default" "action allow") you do not need another special deny rule.&lt;/P&gt;&lt;P&gt;But if you use "app webbrowsing" "service any" your config should be reviewed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2014 08:05:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29626#M21636</guid>
      <dc:creator>kbe</dc:creator>
      <dc:date>2014-06-10T08:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: ports unknown allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29627#M21637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had the same questions, please read my topic&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/message/32787"&gt;Strange output from Nmap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I hope that it will explain your problem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2014 14:52:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29627#M21637</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-06-10T14:52:30Z</dc:date>
    </item>
    <item>
      <title>Re: ports unknown allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29628#M21638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;kbe, we have an application group defined (Untrust-to-DMZ - Allowed) which is set to allow applications (ftp, icmp, ping ssh, ssl, web-browsing, ftp) We added flash individually but we'll probably change that and add it to our app group. Services however are set to "any" not application default. Perhaps that is the problem? I believe we did this because we have a web server app that had no app definition in the PA-500. We would need to create a custom app and over ride. Our assumption was that ports would only be allowed for the apps specified.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So does setting services to "application-default" instead of "any" force allowing ports only for those apps specified as being allowed?&lt;BR /&gt;&lt;IMG alt="3a.jpg" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/13857_3a.jpg" style="height: 85px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2014 17:26:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29628#M21638</guid>
      <dc:creator>panfw_notify</dc:creator>
      <dc:date>2014-06-10T17:26:38Z</dc:date>
    </item>
    <item>
      <title>Re: ports unknown allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29629#M21639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;slv post is interesting. thanks for the link&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/message/32787"&gt;Strange output from Nmap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are not specifying application default which is possibly the problem?. gwesson mentions that this may not work if there is not a secondary policy after that deny's all to DMZ. We do have a deny all policy at the end our other policies,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="B5.jpg" class="jive-image image-2" src="https://live.paloaltonetworks.com/legacyfs/online/13861_B5.jpg" style="height: 63px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And this is a log example for Port 445. The Deny all to the DMZ policy does block port 445 recognized as ms-smb. I would have expected this for the untrust-to-DMZ policy to our website but it is allowing request for 445 traffic as unknown.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="D7.jpg" class="jive-image image-4" src="https://live.paloaltonetworks.com/legacyfs/online/13863_D7.jpg" style="height: 170px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5 class="simple" style="padding-top: 8px; font-size: 20px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #666666;"&gt;&lt;/H5&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2014 18:12:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29629#M21639</guid>
      <dc:creator>panfw_notify</dc:creator>
      <dc:date>2014-06-10T18:12:52Z</dc:date>
    </item>
    <item>
      <title>Re: ports unknown allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29630#M21640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The best way to explain what is happening here is to read your security policy while ignoring the "application" part of the rule for a minute.&amp;nbsp; When you do that, your policy reads:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"permit from untrust to dmz any service(port#)"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which is not what you were specifically intending to do.&amp;nbsp; So now, re-read your policy with the application back in there:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"permit from untrust to trust specific applications on any service(port#)"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But that's not also what you intended... right now, anyone can connect to any port on your server, do a TCP 3-way handshake, and then when the application does not match the list of approved applications, then the firewall will block that traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The right answer is to use "application-default" on the service column.&amp;nbsp; This will only open the port(s) required for the applications that you've specified... this is a major difference from using "any" in the service column.&amp;nbsp; If you wanted to further restrict, you could manually specify TCP/UDP ports/port-ranges instead of taking Palo Alto Networks' "application-default". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The net-net here is NEVER NEVER NEVER EVER use "any" on the service for untrust-to-dmz|internal|trust|etc.&amp;nbsp; It's okay to have it as "any" for outbound rules...&amp;nbsp; if you're going to let a user run SSH out of your environment, do you care if it's TCP/22 vs TCP/23? Probably not, as it doesn't change your visibility or control one bit.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2014 18:38:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29630#M21640</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2014-06-10T18:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: ports unknown allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29631#M21641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks jared. Yeah we need to hone our rules down a bit more. The default application on the services makes sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2014 18:59:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29631#M21641</guid>
      <dc:creator>panfw_notify</dc:creator>
      <dc:date>2014-06-10T18:59:01Z</dc:date>
    </item>
    <item>
      <title>Re: ports unknown allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29632#M21642</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could not have explained it better then Jared.&lt;/P&gt;&lt;P&gt;Do never use "any" for service on incoming rules and try to use "app default" wherever possible to get tight control on your network traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And concerning one of your questions about a deny-all rule:&lt;/P&gt;&lt;P&gt;The PA has an implicit rule that you can not see and that does not show up in log files. This rule is deny any nter-zone and allow-all intra-zone traffic.&lt;/P&gt;&lt;P&gt;If you create a deny-all rule (also known as clean-up rule) you have to make sure that you allow required intra-zone traffic that is needed.&lt;/P&gt;&lt;P&gt;I use a cleanup as last rule with any-any-any-deny.&lt;/P&gt;&lt;P&gt;Others don´t.&lt;/P&gt;&lt;P&gt;There is no best practise for that but alot people prefer to have a clear rule set with explicit conditions and no implicit rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2014 07:26:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ports-unknown-allowed/m-p/29632#M21642</guid>
      <dc:creator>kbe</dc:creator>
      <dc:date>2014-06-11T07:26:03Z</dc:date>
    </item>
  </channel>
</rss>

