<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to disable App-ID for all applications in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-app-id-for-all-applications/m-p/32081#M23517</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to use an application override policy with a custom application.&amp;nbsp; The application override policy can be defined for a particular source or destination IP range/subnet.&amp;nbsp; Any session which matches the app override policy will be classified as the custom application.&amp;nbsp; This will also disable all layer 7 inspection on that traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The document below gives further details.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1071"&gt;https://live.paloaltonetworks.com/docs/DOC-1071&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;-- Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 Oct 2012 17:32:23 GMT</pubDate>
    <dc:creator>kfindlen</dc:creator>
    <dc:date>2012-10-10T17:32:23Z</dc:date>
    <item>
      <title>How to disable App-ID for all applications</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-app-id-for-all-applications/m-p/32079#M23515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've got two VWIRE pairs that see some duplicate traffic.&amp;nbsp; &lt;/P&gt;&lt;P&gt;Basically:&lt;/P&gt;&lt;P&gt;VWIRE1 sees LAN to Internet&lt;/P&gt;&lt;P&gt;VWIRE2 sees LAN+DMZ to Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I'd like to do to free up some resources is disable inspection on one of those pairs for traffic when source IP matches a CIDR block.&amp;nbsp; Creating a custom application doesn't work in this case.&lt;/P&gt;&lt;P&gt;Has anyone been able to do this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you!&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Oct 2012 17:25:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-app-id-for-all-applications/m-p/32079#M23515</guid>
      <dc:creator>abarnett</dc:creator>
      <dc:date>2012-10-10T17:25:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable App-ID for all applications</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-app-id-for-all-applications/m-p/32080#M23516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the link to disable application inspection on the firewall for certain traffic.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-2816"&gt;https://live.paloaltonetworks.com/docs/DOC-2816&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create two custom applications under Objects&amp;gt;Applications&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 )&amp;nbsp; For tcp port,&amp;nbsp; select under port :- tcp/dynamic&lt;/P&gt;&lt;P&gt;2) For UDP, select under port :udp/dynamic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create two separate application override rules , one of tcp and the other for udp traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One security rue will have protocol TCP&amp;nbsp; and ports 0-65535&lt;/P&gt;&lt;P&gt;The other security rule will have protocol UDP and port 0-65535&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Oct 2012 17:31:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-app-id-for-all-applications/m-p/32080#M23516</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-10-10T17:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable App-ID for all applications</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-app-id-for-all-applications/m-p/32081#M23517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to use an application override policy with a custom application.&amp;nbsp; The application override policy can be defined for a particular source or destination IP range/subnet.&amp;nbsp; Any session which matches the app override policy will be classified as the custom application.&amp;nbsp; This will also disable all layer 7 inspection on that traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The document below gives further details.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1071"&gt;https://live.paloaltonetworks.com/docs/DOC-1071&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;-- Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Oct 2012 17:32:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-app-id-for-all-applications/m-p/32081#M23517</guid>
      <dc:creator>kfindlen</dc:creator>
      <dc:date>2012-10-10T17:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable App-ID for all applications</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-app-id-for-all-applications/m-p/32082#M23518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you create the application over ride rule along with the custom application and commit, you need to clear all the existing sessions from the firewall that uses inbuilt application&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;clear session all&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&amp;gt;clear session all filter source &amp;lt;x.x.x.x&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now test the application override rule by sending traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Oct 2012 17:36:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-app-id-for-all-applications/m-p/32082#M23518</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-10-10T17:36:17Z</dc:date>
    </item>
  </channel>
</rss>

