<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to find application in Palo Alto (by tcp/udp ports) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42428#M31157</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We took the same approach as Hitsec when migrating from Check Point and it worked well for us.&amp;nbsp; We stared off with a policy that looked very similar to a Firewall-1 policy and then gradually Palo-ized it.&amp;nbsp; We always use "service: application-default" where possible when allowing applications and "service: any" when blocking them. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 03 Mar 2013 21:40:54 GMT</pubDate>
    <dc:creator>DavePalo</dc:creator>
    <dc:date>2013-03-03T21:40:54Z</dc:date>
    <item>
      <title>How to find application in Palo Alto (by tcp/udp ports)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42421#M31150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dears,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am working on a migration from Check Point to Palo Alto. We used that PA Migration Tool for CP rules into PA.&lt;/P&gt;&lt;P&gt;The main problem is a&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;ll CP rules are based on services and we want to transform them into PA applications... BUT, the PA apps tool (applipedia) doesnt show the apps by ports...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SOmetimes is hard to uderstand the name of PA applications... and also we would like to know if there is a method to find PA application using ports numbers...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example:&lt;/P&gt;&lt;P&gt;what is the PA Application name for service using TCP 5757 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;right now we are searching on internet those aplications then relating with PA apps...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is there any easy way easy to do that ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2013 19:18:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42421#M31150</guid>
      <dc:creator>FabioGarcia</dc:creator>
      <dc:date>2013-03-01T19:18:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to find application in Palo Alto (by tcp/udp ports)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42422#M31151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If there exits an application based on the port,you can find it using applipedia by simply typing the port number.&lt;/P&gt;&lt;P&gt;&lt;A href="http://apps.paloaltonetworks.com/applipedia//" title="http://apps.paloaltonetworks.com/applipedia//"&gt; Application Research Center&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2013 19:30:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42422#M31151</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-03-01T19:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to find application in Palo Alto (by tcp/udp ports)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42423#M31152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Navigate to monitor tab --traffic logs click on a port number and edit it, press enter you will see all applications for that port number.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2013 19:32:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42423#M31152</guid>
      <dc:creator>sraghunandan</dc:creator>
      <dc:date>2013-03-01T19:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to find application in Palo Alto (by tcp/udp ports)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42424#M31153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://play.google.com/store/apps/details?id=ch.sourcenet.applipedia" title="https://play.google.com/store/apps/details?id=ch.sourcenet.applipedia"&gt;https://play.google.com/store/apps/details?id=ch.sourcenet.applipedia&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type 5757 and it will spit out:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;msn-file-transfer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;among other info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default ports: tcp/443, tcp/1863, tcp/1025-65535, udp/1025-65535&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I guess there is some API available to do these kind of searches...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: Seems to be a custom API because a search for "tcp/5757" ends up with a http request for:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://applipedia.sourcenet.ch/?app=tcp%2F5757" title="http://applipedia.sourcenet.ch/?app=tcp%2F5757"&gt;http://applipedia.sourcenet.ch/?app=tcp%2F5757&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2013 19:34:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42424#M31153</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-03-01T19:34:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to find application in Palo Alto (by tcp/udp ports)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42425#M31154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One approach you might want to consider is to create the PA rules with services (ports) first like they were in Checkpoint.&amp;nbsp; Then as you see what applications are going out on the appropriate rule, you add the application to a duplicate rule above the services (ports) only rule. Based on the size add complexity of your rule base this may be an option.&amp;nbsp; We had a lot of special rules on our Checkpoint rule base to address applications that used the non-standard ports. These are the ones that were easily converted to Application based rules with service as "any".&amp;nbsp; I am assuming you are doing a in-place replacement as opposed to inline deployment followed by removal of checkpoint. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Mar 2013 23:20:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42425#M31154</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2013-03-02T23:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to find application in Palo Alto (by tcp/udp ports)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42426#M31155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NEVER use "service:any", at least use "service:application-default" or if possible manually define the port/port-ranges to be used.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Mar 2013 18:12:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42426#M31155</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-03-03T18:12:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to find application in Palo Alto (by tcp/udp ports)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42427#M31156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What's your rationale for not ever using service:any? One of the selling points that PA uses is that their firewall is "port agnostic" - App-IDs can be relied upon over TCP ports&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The app cache pollution vulnerability that recently was an issue was fixed - they don't cache the App-ID anymore&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Mar 2013 19:15:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42427#M31156</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-03-03T19:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to find application in Palo Alto (by tcp/udp ports)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42428#M31157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We took the same approach as Hitsec when migrating from Check Point and it worked well for us.&amp;nbsp; We stared off with a policy that looked very similar to a Firewall-1 policy and then gradually Palo-ized it.&amp;nbsp; We always use "service: application-default" where possible when allowing applications and "service: any" when blocking them. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Mar 2013 21:40:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42428#M31157</guid>
      <dc:creator>DavePalo</dc:creator>
      <dc:date>2013-03-03T21:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to find application in Palo Alto (by tcp/udp ports)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42429#M31158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My first installation was done in a pretty simple manner which was (at the time, don't know if it still is) recommended by Palo Alto.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Three rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First rule - make an application group with applications you *know* the business requires - web browsing, SSL, whatever else. Apply URL/Virus filtering policy as defined, and then allow any/any to pass it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second rule - make an application group with applications you *know* the business does NOT require - bit torrent, TOR, nasties which the business doesn't want. Deny any traffic which matches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Third rule - allow any/any, *but* mail yourself a report daily of everything which hits this rule, then use that report to refine your "good" and "bad" application list for a couple of months until you're happy you've caught everything - then&amp;nbsp; change this to a default deny.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Works, too. I cover probably 80% of my traffic with 2 rules. There are some other rules - mainly server or client specific ones (for example, I have one user who has a defined business need to be able to GRE tunnel out - he has a specific rule matched to his userID to allow it), but the rule base is not nearly as complex as a previous Checkpoint installation was!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Mar 2013 01:14:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42429#M31158</guid>
      <dc:creator>darren_g</dc:creator>
      <dc:date>2013-03-04T01:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to find application in Palo Alto (by tcp/udp ports)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42430#M31159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;App-IDs are still cached but the function has been modified.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look at this video from Checkpoint (somewhat biased but still interresting):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.youtube.com/watch?v=hSCzRfF8ZVQ" title="http://www.youtube.com/watch?v=hSCzRfF8ZVQ"&gt;Palo Alto Networks vs. Check Point - Did PAN &amp;amp;quot;fix&amp;amp;quot; the Firewall - YouTube&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The point is the way App-ID works, depending on which App-IDs you have allowed, one or more packets will be let through the firewall in order to successfully (with low falsepositive rate) identify the application being used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This can of course be bad if the packet(s) contain some vuln which the IPS currently doesnt have a signature for (given that you enabled IPS for these flows) - or for other reasons where you dont expect to see packets let through your firewall unless they are approved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By using "service:application-default", or if possible, manually define which port is expected such as "service:TCP80" the packet must match the basics such as (srczone, dstzone), srcip, dstip and dstport before being inspected further to identify the application being used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This precheck is defined in the workflow of what the PANOS will do to a packet that arrived to a PA box:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A __default_attr="1628" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://media.paloaltonetworks.com/documents/techbrief-app-id.pdf" title="http://media.paloaltonetworks.com/documents/techbrief-app-id.pdf"&gt;http://media.paloaltonetworks.com/documents/techbrief-app-id.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use "service:any" this precheck will always fail (for the particular flow(s)) and exposing the service you actually is trying to protect. Or for that matter leak information in any direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above is also confirmed by the security bulletin released due to the App-ID cache pollution case last xmas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-4315" title="https://live.paloaltonetworks.com/docs/DOC-4315"&gt;https://live.paloaltonetworks.com/docs/DOC-4315&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;App-ID Cache Pollution Avoidance Recommendations&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do not use “any” as the service for allowed applications:&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is Palo Alto Networks recommendation to use “application-default” or specific ports in the service field of the security policies. This prevents applications from running on unusual ports and protocols, which if not intentional, can be a sign of undesired application behavior and usage. Many of the evasion variants observed using the App-ID cache pollution would be addressed if “application-default” had been used in the security policies. All security rules with “any” in the service field should be double-checked and in most cases, should be modified to use a specific port or “application-default”. Note that the device still checks for all applications on all ports, but with this configuration, applications are only allowed on their default ports/protocols. &lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Mar 2013 08:11:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42430#M31159</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-03-04T08:11:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to find application in Palo Alto (by tcp/udp ports)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42431#M31160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks mikand for the well researched and informative post... I know I was "baiting" a bit by saying that PAN claims to be "port agnostic," and you provided the great response I was hoping to see &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Mar 2013 16:05:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-find-application-in-palo-alto-by-tcp-udp-ports/m-p/42431#M31160</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-03-04T16:05:23Z</dc:date>
    </item>
  </channel>
</rss>

