<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: unknown-tcp / udp - please explain in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39082#M28650</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bittorent doesn't depend on unknown tcp/udp, only web-browsing on tcp/udp dynamic ports. If you have 5.0.x this dependence is already done, otherwise a rule has to be inserted for allowing web-browsing before bittorent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Verify the app dynamic update (latest 373-1793) and in case of other error/warning&amp;nbsp; during commit also I suggest opening a support case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 18 May 2013 09:00:19 GMT</pubDate>
    <dc:creator>NGS_SOC</dc:creator>
    <dc:date>2013-05-18T09:00:19Z</dc:date>
    <item>
      <title>unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39080#M28648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know that these two applications stand for unrecognized traffic. It worries me though that for some of the other applications to work, I have to add unknown-tcp/udp to the firewall rule. Example for this would be Bittorrent traffic. To allow Bittorrent, I also have to allow web-browsing and unknown-tcp and unknown-udp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please elaborate on this? If I only want to allow Bittorrent, but also add web-browsing and unknown-tcp, I will open up the firewall for unwanted traffic. I really have a hard time understand this concept.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 May 2013 20:58:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39080#M28648</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-05-17T20:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39081#M28649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Allowing unknown-tcp/udp to allow BitTorrent traffic should not be required.&amp;nbsp; On my device I have utilized BitTorrent with and without encryption over the last few weeks and the traffic logs show that none of the sessions are being identified as unknown-tcp/udp.&amp;nbsp; It's possible this issue is specific to the torrent you are accessing.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The web-browsing component could be required for the tracker communication which can utilize HTTP.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you see this issue on the latest content then I would recommend opening a support case for investigation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 May 2013 21:21:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39081#M28649</guid>
      <dc:creator>kfindlen</dc:creator>
      <dc:date>2013-05-17T21:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39082#M28650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bittorent doesn't depend on unknown tcp/udp, only web-browsing on tcp/udp dynamic ports. If you have 5.0.x this dependence is already done, otherwise a rule has to be inserted for allowing web-browsing before bittorent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Verify the app dynamic update (latest 373-1793) and in case of other error/warning&amp;nbsp; during commit also I suggest opening a support case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 May 2013 09:00:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39082#M28650</guid>
      <dc:creator>NGS_SOC</dc:creator>
      <dc:date>2013-05-18T09:00:19Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39083#M28651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, you are right, there are no warnings anymore about uknown-tcp on commit. However, you are saying that 5.0 automatically resolves those dependencies, does that mean it will actually include the needed services without me specifying them in the rule? That would mean it will still open unknown-tcp/udp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bittorrent was just an example. I've seen this dependency with other apps as well. If other apps rely on unknown-tcp/udp, doesn't that make the whole thing completely insecure? I am opening up the firewall for unknown traffic. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 May 2013 10:07:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39083#M28651</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-05-18T10:07:40Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39084#M28652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In PANOS 4.x all application dependencies have to be explicit allowed in security rules, otherwise warning during may appear and related application could not work properly. Sometimes in large scale this requirement could be annoying or worse.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Version 5.0.x changes this behavior allowing application dependencies if they are granular web-browsing, ssl, ftp and few more. Never unknown traffic, if needed, this have to be allowed with an explicit rule.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 May 2013 11:39:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39084#M28652</guid>
      <dc:creator>NGS_SOC</dc:creator>
      <dc:date>2013-05-18T11:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39085#M28653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So that means, if there are dependencies:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1.) It will resolve them automatically and add the needed services, invisible to the user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2.) Because of that, I don't what what I actually allow through my firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Excuse my ignorance, but are you guys serious?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 May 2013 12:33:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39085#M28653</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-05-18T12:33:02Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39086#M28654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I quote what is reported in PANOS v.5 release note:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;&lt;STRONG&gt;Application Dependency Enhancement&lt;/STRONG&gt; – For some protocols, you can allow an application in security policy without explicitly allowing its underlying protocol. This support is available if the application can be identified within a pre-determined point in the session, and has a dependency on any of the following applications: HTTP, SSL, MSRPC, RPC, t.120, RTSP, RTMP, and NETBIOS-SS. Custom applications based on HTTP, SSL, MS-RPC, or RTSP can also be allowed in security policy without explicitly allowing the underlying protocol. For example, if you want to allow Java software updates, which use HTTP (web-browsing), you no longer have to allow web-browsing. This feature will reduce the overall number of rules needed to manage policies.&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means that few applications can use this enchantment and you never allow unwanted applications. Be aware of how PA recognize application: for example application facebook relies on web-browsing because before facebook the frewall recognize in fact web-browsing app. So the programmer ask themself why not having an implicit application allowing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do not mix together app and service (ports) these are different variables in security rules, as an advice try to use always application defaults as policy enforcement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you keep log option for security rule you are always able what traversed the firewall. Also always in session browser (cli/gui) you can see which kind of app traffic is flowing even with a permit all policy, this is the strength of these devices.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 May 2013 13:48:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39086#M28654</guid>
      <dc:creator>NGS_SOC</dc:creator>
      <dc:date>2013-05-18T13:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39087#M28655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this the same cryptochrome from the infamous why "NSM is a piece of crap" forum? I happened to be the first one to reply to that post.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 May 2013 14:30:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39087#M28655</guid>
      <dc:creator>K_Celenza</dc:creator>
      <dc:date>2013-05-18T14:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39088#M28656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yep. that's the same Cryptochrome :smileygrin:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 May 2013 16:40:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39088#M28656</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-05-18T16:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39089#M28657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Slightly off-topic but I guess this is the thread you both are refering to ? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://forums.juniper.net/t5/Management/Want-some-examples-why-NSM-is-a-piece-of-junk/td-p/101738" title="http://forums.juniper.net/t5/Management/Want-some-examples-why-NSM-is-a-piece-of-junk/td-p/101738"&gt; Want some examples why NSM is a piece of junk? - J-Net Community&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 May 2013 20:49:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39089#M28657</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-05-19T20:49:48Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39090#M28658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow nice thread there &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; I love that kind of candid, to the point feedback &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 May 2013 01:26:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39090#M28658</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-05-20T01:26:27Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39091#M28659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was really upset when I wrote that thread and I might have become too rude throughout the discussion, but I've had it with Juniper back then. Their NSM caused so much trouble it was unbelievable. Unfortunately, the same still holds true today. I just had a major crash on NSM two weeks ago from a failed DMI schema update. I love the SRX for it's concept and the beauty of Junos, but NSM is destroying that platform for me and a lot of my customers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyways. This probably doesn't belong here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 May 2013 10:03:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39091#M28659</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-05-20T10:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39092#M28660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey man, no need to apologize, sometimes my passion bubbles a little too close to the surface too &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 May 2013 13:12:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39092#M28660</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-05-20T13:12:07Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39093#M28661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Back on topic... this is what my PA-500 just threw at me for the 'share-p2p' App-ID on PANOS 4.1.12:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;&lt;SPAN class="commit_details"&gt;&lt;SPAN class="commit_details"&gt;VSYS1&lt;/SPAN&gt;&lt;/SPAN&gt;
&lt;P class="commit_common"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vsys1: Rule 'Allow all with threat' application dependency warning:&lt;/P&gt;
&lt;P class="commit_common"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Application 'share-p2p' requires 'unknown-tcp' be allowed &lt;/P&gt;
&lt;P class="commit_common"&gt;(Module: device)&lt;/P&gt;
&lt;P class="commit_common"&gt;&lt;/P&gt;
&lt;P class="commit_common"&gt;Configuration committed successfully&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So yes, the original poster (cryptochrome) was correct in saying that for certain App-IDs, 'unknown-tcp' needs to be turned on. And I completely agree with him that "that's messed up" - I have to turn on 'unknown-tcp' for certain App-IDs to work? Say what?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 May 2013 13:39:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39093#M28661</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-05-20T13:39:55Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39094#M28662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep. That's what worries me too. In PanOS 5.0 these dependencies are automatically resolved (so you actually never see what the firewall is really opening up). &lt;A __default_attr="7877" __jive_macro_name="user" class="jive_macro jive_macro_user" data-objecttype="3" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; says that it will never be unknown-tcp that would be resolved, but why did 4.x need unknown-tcp and 5.0 does not? Where is this documented? I find this really scary.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 May 2013 14:10:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39094#M28662</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-05-20T14:10:41Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39095#M28663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From PAN-EDU-201 v.5 rev A MOD 4 APP-Id slide 26&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P style="margin-top: 14.4pt; margin-bottom: 1.44pt; text-indent: 0in; text-align: center;"&gt;&lt;SPAN style="font-size: 24.0pt; font-family: Arial; color: #004b72;"&gt;PAN-OS implicitly allows parent applications for a set of commonly used applications&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-top: 14.4pt; margin-bottom: 1.44pt; text-indent: 0in; text-align: center;"&gt;&lt;SPAN style="font-size: 24.0pt; font-family: Arial; color: #004b72;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-top: 4.32pt;"&gt;&lt;SPAN style="font-size: 12.0pt; font-family: Arial; color: black;"&gt;Requiring that dependencies be allowed in order to enable an&lt;/SPAN&gt;&lt;SPAN style="font-size: 12.0pt; font-family: Arial; color: black;"&gt; application can often allow more traffic than intended. For example, enabling access to &lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial; color: black;"&gt;web-browsing just to allow facebook-base allows users to browse other sites, requiring the administrator to configure other policies to regulate this access.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-top: 4.32pt;"&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial; color: black;"&gt;PAN-OS addresses this concern by implicitly allowing dependencies for a set of commonly used applications to streamline the security policy process. Implicit permissions of a parent application are only handled if there is no match with an explicit rule. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-top: 4.32pt;"&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial; color: black;"&gt;The complete list of implicitly allowed applications can be found in &lt;/SPAN&gt;&lt;SPAN style="font-size: 12.0pt; font-family: Arial; color: black; font-style: italic;"&gt;Appendix&lt;/SPAN&gt;&lt;SPAN style="font-size: 12.0pt; font-family: Arial; color: black; font-style: italic;"&gt; B&lt;/SPAN&gt;&lt;SPAN style="font-size: 12.0pt; font-family: Arial; color: black;"&gt; of this manual.&lt;/SPAN&gt;&lt;/P&gt;

&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appendix B&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;
&lt;P style="margin-top: 14.4pt; margin-bottom: 1.44pt; text-indent: 0in; text-align: center;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em; text-align: left;"&gt;Allowed Application&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;• software-update apps&lt;/P&gt;
&lt;P&gt;• business-systems apps (e.g., erp-crm, storage-backup, sharepoint)&lt;/P&gt;
&lt;P&gt;• web-mail apps, IMs, social-networking&lt;/P&gt;
&lt;P&gt;Implicit &amp;gt;&amp;gt; web-browsing&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Apps identified in rpc decoder with a specific program ID (e.g., mount, nfs, portmapper, ibm-clearcase)&lt;/P&gt;
&lt;P&gt;Implicit &amp;gt;&amp;gt; rpc&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Apps identified in msrpc decoder with specific UUID (e.g., ms-exchange, active-directory, arcserve)&lt;/P&gt;
&lt;P&gt;Implicit &amp;gt;&amp;gt; &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;msrpc&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;msrpc&lt;/P&gt;
&lt;P&gt;Implicit &amp;gt;&amp;gt; ms-ds-smb&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ms-ds-smb&lt;/P&gt;
&lt;P&gt;Implicit &amp;gt;&amp;gt; netbios-ss&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Apps identified in rtsp decoder based on uri path in first request message (including custom apps)&lt;/P&gt;
&lt;P&gt;Implicit &amp;gt;&amp;gt; rtsp&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Apps identified in rtmp decoder based on uri path in the first request packet (e.g., bbc-iplayer)&lt;/P&gt;
&lt;P&gt;Implicit &amp;gt;&amp;gt; rtmp, rtmpt&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Media streaming apps (e.g., napster, megavideo)&lt;/P&gt;
&lt;P&gt;Implicit &amp;gt;&amp;gt; flash&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ms-rdp, msn-remote-desktop&lt;/P&gt;
&lt;P&gt;Implicit &amp;gt;&amp;gt; t.120&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Apps identified based on SSL hello or certificate in the response.&lt;/P&gt;
&lt;P&gt;Ssh can remain in both uses-apps and implicit-uses-apps&lt;/P&gt;
&lt;P&gt;Implicit &amp;gt;&amp;gt; ssl&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;yahoo-voice, gtalk-voice, msn-voice, msn-video, facetime&lt;/P&gt;
&lt;P&gt;Implicit &amp;gt;&amp;gt; stun&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;several IM apps&lt;/P&gt;
&lt;P&gt;Implicit &amp;gt;&amp;gt; jabber&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;gotomeeting, gotomypc, gotoassist&lt;/P&gt;
&lt;P&gt;Customer is not expected to understand internals about Citrix ICA/Jedi&lt;/P&gt;
&lt;P&gt;Implicit &amp;gt;&amp;gt; citrix/citrix-jedi&lt;/P&gt;

&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Never allowed unknown udp/tcp, I hope this could hlep&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 May 2013 14:31:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39095#M28663</guid>
      <dc:creator>NGS_SOC</dc:creator>
      <dc:date>2013-05-20T14:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39096#M28664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;So yes, the original poster (cryptochrome) was correct in saying that for certain App-IDs, 'unknown-tcp' needs to be turned on. And I completely agree with him that "that's messed up" - I have to turn on 'unknown-tcp' for certain App-IDs to work? Say what?&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is an uncommon case.&amp;nbsp; Reading-up on &lt;A href="http://en.wikipedia.org/wiki/Share_(P2P)"&gt;Share-P2P&lt;/A&gt;, it looks like it's all encrypted traffic - which probably makes it impossible to create a signature-based App-ID.&amp;nbsp; I'm guessing the heuristics engine is what eventually detects this app, but until then it's identified as unknown-tcp.&amp;nbsp; I'm not aware of any "business"-class apps that require unknown-tcp to also be allowed.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you really must use this in your environment, then it would probably be a good idea to limit its use to specific users/computers/zones.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 May 2013 14:53:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39096#M28664</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2013-05-20T14:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39097#M28665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;
&lt;P&gt;jvalentine wrote:&lt;/P&gt;
&lt;P&gt;If you really must use this in your environment, then it would probably be a good idea to limit its use to specific users/computers/zones.&amp;nbsp; &lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Honestly you're right, I don't have a business use case for this one. It was just an observation (I happened to be building an App-ID filter for Breaking Point testing I'm doing and I noticed that warning when I pushed the commit job)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 May 2013 14:56:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39097#M28665</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-05-20T14:56:25Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39098#M28666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks &lt;A __default_attr="7877" __jive_macro_name="user" class="jive_macro jive_macro_user" data-objecttype="3" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;. What I still don't understand after reading this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Say I have a rule base that does not allow web-browsing at all. Now I add a rule that allows facebook-base. Since facebook-base also needs web-browsing, it resolves this dependency and invisibly adds we-browsing to the facebook-base rule. So I now have a rule that allows web-browsing plus facebook-base. Does that mean that any web-browsing to any destination is now allowed? Or ist it smart enough to actually only allow web-browsing to facebook?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 May 2013 15:03:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39098#M28666</guid>
      <dc:creator>cryptochrome</dc:creator>
      <dc:date>2013-05-20T15:03:35Z</dc:date>
    </item>
    <item>
      <title>Re: unknown-tcp / udp - please explain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39099#M28667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;Say I have a rule base that does not allow web-browsing at all. Now I add a rule that allows facebook-base. Since facebook-base also needs web-browsing, it resolves this dependency and invisibly adds we-browsing to the facebook-base rule. So I now have a rule that allows web-browsing plus facebook-base. Does that mean that any web-browsing to any destination is now allowed? Or ist it smart enough to actually only allow web-browsing to facebook?&lt;/P&gt;

&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With 5.0, PAN-OS only allows just enough web-browsing in order to enable facebook-base.&amp;nbsp; It won't permit other non-facebook web-browsing activities. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This type of rule was also possible with 4.1, but was a major pain.&amp;nbsp; You had to create a custom URL category that contained things like facebook.com, *.facebook.com, fbcdn.com, etc. etc.&amp;nbsp; Then you needed two firewall rules:&lt;/P&gt;&lt;P&gt;- from trust to untrust application=web-browsing SERVICE/URL CATEGORY="new custom FB category" action=allow&lt;/P&gt;&lt;P&gt;- from trust to untrust application=facebook-base action=allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first rule allowed web-browsing only to domains listed in that custom category, which would be enough to let the App-ID shift into facebook-base.&amp;nbsp; The 5.0 code does the same thing, but without the complexity. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Coincidently, this is one of those few times where it is extremely useful to use URL CATEGORY as match criteria in the firewall rule.)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 May 2013 15:19:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unknown-tcp-udp-please-explain/m-p/39099#M28667</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2013-05-20T15:19:03Z</dc:date>
    </item>
  </channel>
</rss>

