<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Question regarding unknown application behaviour in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/question-regarding-unknown-application-behaviour/m-p/30022#M21930</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;
&lt;P&gt;Would that approach be a viable option for a migration in large enterprise environment with a lot of firewall rules allowing proprietary applications where no signature for AppID exists (inhouse application, niche applications). At least for a transition phase until a custom AppID definition can be created or research can be done what is actually transfered over the connection (may be with help of the log or reporting).&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;Talk to your SE. They might have a migration tool to help you get from your current firewall to the Palo Alto. But yes, that's the way I did it way back on PAN-OS 2.0. Then you can use the custom reports to see what apps are actually being used (and that you approve of) and you can start setting them in the security policy. &lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;
&lt;P&gt;Another question: Web Server in DMZ hosting web sites, which application would you use here to allow connections from public Internet to the web server in the DMZ: web-browsing? That sounds inappropriate but there is no web-hosting application in applipedia?&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;It would be web-browsing. Web-browsing is the parent app for HTTP requests. (You have to be careful. You may have child apps like hotmail and web-crawlers accessing your website that be blocked if you just allow web-browsing.) &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 19 Oct 2012 20:09:13 GMT</pubDate>
    <dc:creator>mharding</dc:creator>
    <dc:date>2012-10-19T20:09:13Z</dc:date>
    <item>
      <title>Question regarding unknown application behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-regarding-unknown-application-behaviour/m-p/30018#M21926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lets say you configure a rule with:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Application = Any&lt;/P&gt;&lt;P&gt;Service = Custom Service (TCP port 12345)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when the AppID engine cannot match anything I guess it classifies the traffic as "unknown-tcp".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will the traffic be allowed (because unknown-tcp is part of Any and the firewall will practically act as statefull firewall) or will it be denied?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the purpose of Application Overrides? This seems complicated to me since you have to go to a different policy section and configure it in addition to the actual firewall rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 17:24:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-regarding-unknown-application-behaviour/m-p/30018#M21926</guid>
      <dc:creator>Anon1</dc:creator>
      <dc:date>2012-10-19T17:24:23Z</dc:date>
    </item>
    <item>
      <title>Re: Question regarding unknown application behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-regarding-unknown-application-behaviour/m-p/30019#M21927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you set the application to any and just define a port, it acts like a basic firewall. Not matter what application is being used (DNS/SMTP/Web-Browsing/SSL), it's going to be allowed as long as it's using the defined port/service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Application Override policies bypass the App-ID engine. &lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;
&lt;P style="font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit;"&gt;An application override policy is used to change the way the firewall classifies network traffic into applications.&amp;nbsp; An application override with a custom application will prevent the session from being processed by the App-ID engine, which is a Layer-7 inspection. The firewall is forced to handle the session as a regular stateful inspection firewall at Layer-4.&amp;nbsp; If an existing application, web-browsing, for example, is used in the application override, the rule will force all matching traffic into Layer-7 inspection for that specific application.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P style="font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit;"&gt;An application override could be used wilth custom internal applications that use non-standard port numbers or internal applications that are classified by the firewall as "unknown" and custom definitions have been created for them.&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1343"&gt;Application Override and Scanning Engines&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A __default_attr="1071" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 18:22:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-regarding-unknown-application-behaviour/m-p/30019#M21927</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2012-10-19T18:22:16Z</dc:date>
    </item>
    <item>
      <title>Re: Question regarding unknown application behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-regarding-unknown-application-behaviour/m-p/30020#M21928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What your rule actually means is "allow if tcp port = 12345, dont care which appid is identified" (assuming your action was allow).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which means that if you set "appid=any" to all your rules then PA will work just like any SPI-firewall (only looking at srcip, dstip, srcport, dstport (if we ignore the other features which PA have like IPS, AV, SSL termination, URL categorization etc)).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unknown-tcp is a session/flow which doesnt match any known appid. There is also unknown-udp and unknown-p2p.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in your case unknown-tcp will be allowed aswell.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A recommendation is therefor to put a specific action=deny for appid=unknown-tcp, unknown-udp and unknown-p2p.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note however that some appid's demands that unknown traffic is being allowed in order to fully identify the appid in question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Application overrides is to manually force the PA to detect specific traffic as a appid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either due to reporting (for example if you for some reasons know that traffic going to x.x.x.x TCP80 is always http, then you could setup an application override to "dstip=x.x.x.x, dstport=80, proto=tcp, override=web-browsing". The override can also be used if PA incorrectly identifies a specific flow as wrong appid type.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually override isnt used (except for the case when PA misidentifies a flow).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 18:48:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-regarding-unknown-application-behaviour/m-p/30020#M21928</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-10-19T18:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Question regarding unknown application behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-regarding-unknown-application-behaviour/m-p/30021#M21929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, so if AppID=Any and Service=Custom (TCP / UDP / Port number / range) then the device works like a traditional stateful firewall (even if AppID classifies the traffic as unknown)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would that approach be a viable option for a migration in large enterprise environment with a lot of firewall rules allowing proprietary applications where no signature for AppID exists (inhouse application, niche applications). At least for a transition phase until a custom AppID definition can be created or research can be done what is actually transfered over the connection (may be with help of the log or reporting).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another question: Web Server in DMZ hosting web sites, which application would you use here to allow connections from public Internet to the web server in the DMZ: web-browsing? That sounds inappropriate but there is no web-hosting application in applipedia?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 19:55:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-regarding-unknown-application-behaviour/m-p/30021#M21929</guid>
      <dc:creator>Anon1</dc:creator>
      <dc:date>2012-10-19T19:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: Question regarding unknown application behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-regarding-unknown-application-behaviour/m-p/30022#M21930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;
&lt;P&gt;Would that approach be a viable option for a migration in large enterprise environment with a lot of firewall rules allowing proprietary applications where no signature for AppID exists (inhouse application, niche applications). At least for a transition phase until a custom AppID definition can be created or research can be done what is actually transfered over the connection (may be with help of the log or reporting).&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;Talk to your SE. They might have a migration tool to help you get from your current firewall to the Palo Alto. But yes, that's the way I did it way back on PAN-OS 2.0. Then you can use the custom reports to see what apps are actually being used (and that you approve of) and you can start setting them in the security policy. &lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;
&lt;P&gt;Another question: Web Server in DMZ hosting web sites, which application would you use here to allow connections from public Internet to the web server in the DMZ: web-browsing? That sounds inappropriate but there is no web-hosting application in applipedia?&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;It would be web-browsing. Web-browsing is the parent app for HTTP requests. (You have to be careful. You may have child apps like hotmail and web-crawlers accessing your website that be blocked if you just allow web-browsing.) &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 20:09:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-regarding-unknown-application-behaviour/m-p/30022#M21930</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2012-10-19T20:09:13Z</dc:date>
    </item>
    <item>
      <title>Re: Question regarding unknown application behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-regarding-unknown-application-behaviour/m-p/30023#M21931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;OK, so if AppID=Any and Service=Custom (TCP / UDP / Port number / range) then the device works like a traditional stateful firewall (even if AppID classifies the traffic as unknown)?&lt;/P&gt;

&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes and no. Appid is always active in the background - but this particular rule will just ignore whatever appid the session is being identified as.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is also a sales slide with a brief description on what the PA will do on a packet which arrives on one of its dataplane interfaces. The first thing (according to this slide) which the PA does is to verify the ip header in terms of srcip, dstip, srcport, dstport. If there are no security rules which matches these items then the packet is dropped right away. But if the packet is accepted then all the shebang of appid, decoding, heuristics etc is performed in what the marketing people calls "single pass engine".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in this case the flow is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Verify ip header (do we have any security rule which might match the ip header?).&lt;/P&gt;&lt;P&gt;2) Detect appid etc.&lt;/P&gt;&lt;P&gt;3) Now go through the security rules and see if the packet should be allowed or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE _modifiedtitle="true" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;Would that approach be a viable option for a migration in large enterprise environment with a lot of firewall rules allowing proprietary applications where no signature for AppID exists (inhouse application, niche applications). At least for a transition phase until a custom AppID definition can be created or research can be done what is actually transfered over the connection (may be with help of the log or reporting).&lt;/P&gt;

&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Except for what &lt;SPAN class="j-post-author "&gt;&lt;STRONG&gt;&lt;A _jive_internal="true" class="jiveTT-hover-user jive-username-link" data-avatarid="1065" data-externalid="" data-presence="null" data-userid="2107" data-username="umphmharding" href="https://live.paloaltonetworks.com/people/umphmharding" id="jive-210722019331336491380"&gt;umphmharding&lt;/A&gt;&lt;/STRONG&gt;&lt;/SPAN&gt; already said you wont make it worse by just doing a 1:1 replacement. However the point of getting a PA is in most cases to improve the security but at the same time if you do this in small steps then it will most likely be easier to troubleshoot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise if you do everything in a single service window and problems arrives (not necessary due to the PA but more likely due to app developers being detected doing things they are not allowed to with their apps like pushing SSH over TCP80 and such) there will most likely be one or another blame on "yeah its that PA's fault".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you start with just do a 1:1 transition on srcip, dstip, srcport, dstport and see that being stable for a week or so the next step will be to, along with the reports from PA device itself, start to limit each flow (security rule) by enabling appid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the final step will be to enable IPS, AV, blocking of files etc (unless you do this rule by rule in step 2 above).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE _modifiedtitle="true" class="jive_text_macro jive_macro_quote"&gt;Another question: Web Server in DMZ hosting web sites, which application would you use here to allow connections from public Internet to the web server in the DMZ: web-browsing? That sounds inappropriate but there is no web-hosting application in applipedia?&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;You could as a start just use a security rule for your DMZ server where you set "appid=any" and then look in the logs (or create a report) where you see how the PA identifies this traffic and then apply just that appid for this particular security rule. If you use HTTPS I would strongly advice you to read up on the SSL termination features of PA so the PA can inspect the encrypted traffic aswell.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For other cases you can also contact the appid team at PA if you have an application which isnt being identified by PA and this team will either create a custom appid for you (available through regular updates but only your boxes will see it) or make it commonly available for everybody to use. You can also create your own custom appid's (and IPS signatures which are similar) without involving the appid team.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: WTF - the quoting works in edit mode but not when I save the post :S&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Oct 2012 09:19:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-regarding-unknown-application-behaviour/m-p/30023#M21931</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-10-20T09:19:19Z</dc:date>
    </item>
  </channel>
</rss>

