<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: A quick application based policy query in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/a-quick-application-based-policy-query/m-p/32084#M23520</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Andiehuk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please let us know the name of the application, you are trying to add here in your PAN firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;The most common example is web browsing &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;as a dependent application for &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;facebook&lt;/SPAN&gt;)&amp;nbsp; that transitions into "Facebook" and then this further &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;transitions&lt;/SPAN&gt; into "Facebook chat". If a user is blocked from web-browsing then they will never transition to a more specific &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;aplication&lt;/SPAN&gt;. Each time an application transitions to something more specific it is passed through the list of security rules again to see if it should be handled by a different security policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 22 May 2014 16:03:43 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-05-22T16:03:43Z</dc:date>
    <item>
      <title>A quick application based policy query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-quick-application-based-policy-query/m-p/32083#M23519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to better understand application policies and their dependencies and have a question I'm hoping someone can clear up for me. Lets for example say I'm trying to allow users access to an application which has SSH as a dependency. Lets also say that I cannot limit the untrusted endpoints the users can get to using this app policy because the endpoints are CDN based so the IP range is vast and forever changing. My policy is therefore as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Trust Any to Untrust Any - Allowed Apps: Original App + SSH due to the original apps dependency requirement&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume with the above policy in place everyone can now use SSH from a trusted host to untrusted host whether they use the original app or not? How do I allow the original application to work but not give everyone SSH outbound access to everything at the same time? Am I misunderstanding the whole concept here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your help is greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the best&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 May 2014 17:38:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-quick-application-based-policy-query/m-p/32083#M23519</guid>
      <dc:creator>AndrewHenderson</dc:creator>
      <dc:date>2014-05-21T17:38:37Z</dc:date>
    </item>
    <item>
      <title>Re: A quick application based policy query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-quick-application-based-policy-query/m-p/32084#M23520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Andiehuk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please let us know the name of the application, you are trying to add here in your PAN firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;The most common example is web browsing &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;as a dependent application for &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;facebook&lt;/SPAN&gt;)&amp;nbsp; that transitions into "Facebook" and then this further &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;transitions&lt;/SPAN&gt; into "Facebook chat". If a user is blocked from web-browsing then they will never transition to a more specific &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;aplication&lt;/SPAN&gt;. Each time an application transitions to something more specific it is passed through the list of security rules again to see if it should be handled by a different security policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 May 2014 16:03:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-quick-application-based-policy-query/m-p/32084#M23520</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-05-22T16:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: A quick application based policy query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-quick-application-based-policy-query/m-p/32085#M23521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Hulk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply. Lets say the app is Fasp. I need to allow SSH to any for Fasp to work to any. This then means unless I'm misunderstanding something here that SSH is now available to anywhere whether the user is using fasp or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the best&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 May 2014 19:33:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-quick-application-based-policy-query/m-p/32085#M23521</guid>
      <dc:creator>AndrewHenderson</dc:creator>
      <dc:date>2014-05-28T19:33:48Z</dc:date>
    </item>
    <item>
      <title>Re: A quick application based policy query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-quick-application-based-policy-query/m-p/32086#M23522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Andy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me clarify for you. If you enable Application&amp;nbsp; FASP in your security policy, then it will &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;explicitly allow the underlying &lt;/SPAN&gt;dependent application SSH.&amp;nbsp; But, that does not mean, the source IP's (users) will be able to access SSH application&amp;nbsp; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;i.e putty, &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;remoteNG&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;etc&lt;/SPAN&gt;)&lt;SPAN class="GINGER_SOFTWARE_mark"&gt; .&lt;/SPAN&gt; Only if the traffic is coming in conjunction with the parent application FASP, then only the firewall will allow the traffic through it. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;NOTE: With PAN-OS 5.0.0 software and above, we can now &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;allow an application in&lt;/SPAN&gt; security policy without the need to explicitly allow the underlying protocol dependency (for most protocols)&lt;SPAN class="GINGER_SOFTWARE_mark"&gt; .&lt;/SPAN&gt; This is supported only if the application can be identified within a pre-determined point in the session. Applications that qualify for this PAN-OS feature will have this support enabled in the Content version starting onwards&lt;/SPAN&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt; 323.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;I did a test on my LAB:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;STRONG&gt;Security RULE-1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Source IP- 1.1.1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;destination&lt;/SPAN&gt; IP-2.2.2.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Application FASP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Action -Allow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;STRONG&gt;Security RULE-2&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Source IP- 1.1.1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;destination&lt;/SPAN&gt; IP-2.2.2.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Application ANY&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Action -Deny&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;While trying to access IP 2.2.2.2 through SSH &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;putty) from IP 1.1.1.1, it's falling under RULE-2 and traffic is getting denied by the PAN firewall.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Hope this helps.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Thanks&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 May 2014 02:36:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-quick-application-based-policy-query/m-p/32086#M23522</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-05-29T02:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: A quick application based policy query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/a-quick-application-based-policy-query/m-p/32087#M23523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your explanation Hulk, very much appreciated. When an app can allow it's dependents automatically then these apps should not be appearing in the info popup after you do a commit. For example...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; background-color: #ebedee;"&gt;Application 'fasp' requires 'ssh' be allowed, but 'ssh' is denied in Rule '180 DENY ALL TESTING'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DENY ALL TESTING rule which has been picked up here is way below the FASP rule and doesn't specifically mention SSH. I had read about Apps and their dependencies being allowed however I assumed if it's mentioned at the commit stage then it must be an App that cannot take advantage of that feature. Perhaps PA should rethink that part a little. Adding the info into the app db stating it can allow dependencies automatically would also help somewhat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the best&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 May 2014 13:08:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/a-quick-application-based-policy-query/m-p/32087#M23523</guid>
      <dc:creator>AndrewHenderson</dc:creator>
      <dc:date>2014-05-30T13:08:47Z</dc:date>
    </item>
  </channel>
</rss>

