<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Comprehensive IANA service port listings in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45750#M33629</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;keep in mind that PAN is a Next Generation Firewall, not a legacy firewall. PAN has a native (and you cannot disable it) application identification engine and everything is based on application definition, starting from security policy.&lt;/P&gt;&lt;P&gt;Services or service groups are objects based on port/protocol (just the header) not the payload, where PAN applies his signatures.&lt;/P&gt;&lt;P&gt;With this in your mind you don't have to take care of port or service. The only thing you need to know is the name of the application you want to control. For example, "active-directory" is a PAN application signature and you can (should) use it in your rulebase. You don't have to group protocolo you just have to think in terms of applications you already have on PAN DB. In addition to kerberos, msrpc and netbios applications is everything you need to control communication between clients and AD server.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 14 Jun 2011 22:23:01 GMT</pubDate>
    <dc:creator>migration</dc:creator>
    <dc:date>2011-06-14T22:23:01Z</dc:date>
    <item>
      <title>Comprehensive IANA service port listings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45746#M33625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;[SO] I'm putting together a configuration and I'm wondering if I'm doing any duplicate work that maybe some other PA customer has already done and may be willing to share. I'm creating service definitions that are IANA defined for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set service service-mstsc description "microsoft terminal services" protocol tcp port 3389&lt;/P&gt;&lt;P&gt;set service service-msds-smb description "Microsoft-DS SMB file sharing" protocol tcp port 445&lt;/P&gt;&lt;P&gt;set service service-ntp description "network time protocol" protocol udp port 123&lt;BR /&gt;set service service-ldap description "lightweight directory access protocol" protocol tcp port 389&lt;BR /&gt;set service service-ldaps description "secure lightweight directory access protocol" protocol tcp port 636&lt;BR /&gt;set service service-dns-udp description "domain name service udp" protocol udp port 53&lt;BR /&gt;set service service-dns-tcp description "domain name service tcp" protocol tcp port 53&lt;BR /&gt;set service service-sshd description "secure shell daemon" protocol tcp port 22&lt;BR /&gt;set service service-smtp description "simple mail transfer protocol" protocol tcp port 25&lt;BR /&gt;set service service-smtps description "secure simple mail transfer procotol" protocol tcp 465&lt;BR /&gt;set service service-kerb-auth description "kerberos authentication" protocol tcp 88&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And as I type all of this out I can't help but wonder to myself..."Self, has someone else maybe already done this? Maybe there's a value in sharing resources like this with other users on the PA website..."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, if no one else has done it, I'll do it, but I thought I'd toss the question out there to other engineers, have you guys done this before? Will you share?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you buy me beer if I make all the service definitions for you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to chime in here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Jun 2011 22:39:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45746#M33625</guid>
      <dc:creator>bjaming</dc:creator>
      <dc:date>2011-06-10T22:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: Comprehensive IANA service port listings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45747#M33626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; &lt;SPAN lang="EN-US" style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: #333333; FONT-SIZE: 10pt; mso-ansi-language: EN-US"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: #333333; FONT-SIZE: 10pt; mso-ansi-language: EN-US"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: #333333; FONT-SIZE: 10pt; mso-ansi-language: EN-US"&gt;the most interesting question is: why would you have this traditional port based definitions? And why you don’t use the application definitions? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: #333333; FONT-SIZE: 10pt; mso-ansi-language: EN-US"&gt;The art of PAN for this case is to use the application definitions in context with the "application default". This means, if you select for example the application "ssh", that the application default port (tcp 22) is open and the only allowed traffic is ssh. The application default ports are part of the application description.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: #333333; FONT-SIZE: 10pt; mso-ansi-language: EN-US"&gt;Of cause you can have “any” in the service, this means that you can do ssh on any port. But on the other side, all tcp ports are open and if somebody did a tcp-syn scan to your DMZ servers, he or she can get more information than you would like. So I would recommend you to use always “application default” for rules granting access from the “outside” like the internet.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: #333333; FONT-SIZE: 10pt; mso-ansi-language: EN-US"&gt;This is the way to get the value from PANs application inspection and reduces your efforts, because you don’t need to define the tcp services manually.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: #333333; FONT-SIZE: 10pt; mso-ansi-language: EN-US"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: #333333; FONT-SIZE: 10pt; mso-ansi-language: EN-US"&gt;Best regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="FONT-FAMILY: 'Arial','sans-serif'; COLOR: #333333; FONT-SIZE: 10pt; mso-ansi-language: EN-US"&gt;Florian&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Jun 2011 12:04:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45747#M33626</guid>
      <dc:creator>siebi</dc:creator>
      <dc:date>2011-06-12T12:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: Comprehensive IANA service port listings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45748#M33627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not perfect but a fairly good reference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://media.packetlife.net/media/library/23/common_ports.pdf"&gt;http://media.packetlife.net/media/library/23/common_ports.pdf&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jun 2011 19:29:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45748#M33627</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-06-14T19:29:04Z</dc:date>
    </item>
    <item>
      <title>Re: Comprehensive IANA service port listings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45749#M33628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess I would use the more traditional approach because I have worked on traditional firewalls in the past and a great deal of the rule base I'm seeing on the firewalls I'm trying to reconfigure are policies based on port and protocol. I will look more into the application definition, but as I understand it these are signature based, and protocol based correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSH probably isn't the best example here, but Active Directory for example is, LDAP, LDAPs, KRB-AUTH, ICMP, DNS, etc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That can be defined as an "application" in the sense that I can group all of those protocols together to create an "active directory" application?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that what I should take from your post? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit-I just looked at "application definitions" and it seems that there isn't much difference between them and a service group...I mean unless you've applied a signature to the app def.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jun 2011 21:01:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45749#M33628</guid>
      <dc:creator>bjaming</dc:creator>
      <dc:date>2011-06-14T21:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: Comprehensive IANA service port listings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45750#M33629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;keep in mind that PAN is a Next Generation Firewall, not a legacy firewall. PAN has a native (and you cannot disable it) application identification engine and everything is based on application definition, starting from security policy.&lt;/P&gt;&lt;P&gt;Services or service groups are objects based on port/protocol (just the header) not the payload, where PAN applies his signatures.&lt;/P&gt;&lt;P&gt;With this in your mind you don't have to take care of port or service. The only thing you need to know is the name of the application you want to control. For example, "active-directory" is a PAN application signature and you can (should) use it in your rulebase. You don't have to group protocolo you just have to think in terms of applications you already have on PAN DB. In addition to kerberos, msrpc and netbios applications is everything you need to control communication between clients and AD server.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jun 2011 22:23:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45750#M33629</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-06-14T22:23:01Z</dc:date>
    </item>
    <item>
      <title>Re: Comprehensive IANA service port listings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45751#M33630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Right, I see that I can leverage "application" within the rule sets, maybe I'm getting confused because if I define an application does service/service group/port/protocol (etc) within the policy become redundant?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take for example, vmware view client-server connections (staying away from a definied application within the DB).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a number of ports/protocols that I need to allow in order for this service to work, and it should be accessed from a particular application, what is the method of going about configuring the firewall to allow a user to access this service?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you ask vmware they will say open up 80,443,4172 (tcp/udp) -- assuming we're using a security server in between our client and infrastructure backend.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We'd expect the users to come from a view client of some sort.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Should I define a custom application? Should that custom application use services that I've configured (ports) or service groups that I've configured, along with some sort of signature in order to identify the traffic? So aren't those legacy service (port and protocol) definitions still valid?&amp;nbsp; Which leads me to another thought, how do I define a custom signature?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I'm sure vmware view is a pretty popular application out there, does someone have a custom app for that? Is there a shared repository (that is validated/monitored/approved by PA) that I can download stuff from?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;You'll have to forgive me, I'm still waiting on my class on these devices, which has now been rescheduled until July -_-&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jun 2011 22:43:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45751#M33630</guid>
      <dc:creator>bjaming</dc:creator>
      <dc:date>2011-06-14T22:43:43Z</dc:date>
    </item>
    <item>
      <title>Re: Comprehensive IANA service port listings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45752#M33631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First of all, if in the PAN DB there is no application definition for your application you can:&lt;/P&gt;&lt;P&gt;- create a "custom application", including port and protocol used (optional), parent app (needed to decode the traffic. i.e parent app for some traffic across port 80 is web-browsing application) and, optionally, some signature context. Then, use this custom app in your rulebase or in application override section&lt;/P&gt;&lt;P&gt;- ask PAN an app-id request for that particula application&lt;/P&gt;&lt;P&gt;A trust repository of apps is, for sure, Applipedia on PAN site.&lt;/P&gt;&lt;P&gt;I suggest you start studing all the useful documentation you can find in the KP. Working with PAN is quite different than working with other legacy firewall &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jun 2011 23:00:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45752#M33631</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-06-14T23:00:19Z</dc:date>
    </item>
    <item>
      <title>Re: Comprehensive IANA service port listings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45753#M33632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bjaming,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would select "Application Default" in the Service column in this case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jun 2011 06:47:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45753#M33632</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2011-06-15T06:47:07Z</dc:date>
    </item>
    <item>
      <title>Re: Comprehensive IANA service port listings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45754#M33633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;here are some examples from my experience with migration a traditional rule base to PAN. Most services from traditional firewalls can be translated in the same application with application default. If one application is not working, look for this in the traffic monitor:&lt;BR /&gt;( addr.src in [client ip] ) and&lt;SPAN style="mso-spacerun: yes"&gt;&amp;nbsp;&lt;/SPAN&gt; ( addr.dst in [server ip] ) and (action neq allow )&lt;BR /&gt;Here you can see if you need further applications or change the service from application-default to any.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;For Active Directory to my domain controllers I have allowed the following applications from my clients and member servers:&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV style="margin-left: 2em"&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpFirst" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;active-directory&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpFirst" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;&lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;dns&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpFirst" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;&lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;kerberos&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpMiddle" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;ldap&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpMiddle" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;ms-ds-smb&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpMiddle" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;ms-netlogon&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpMiddle" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;msrpc&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpMiddle" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;netbios-dg&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpMiddle" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;netbios-ns&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpMiddle" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;netbios-ss&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpMiddle" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;ntp&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpLast" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;ping&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;For VMware I have seen the following apps between my vSphere client and the vCenter server:&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV style="margin-left: 2em"&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpFirst" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;ssl (on different port like 443, 8443, 8084, 80)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoListParagraphCxSpLast" style="TEXT-INDENT: -18pt; mso-list: l0 level1 lfo1"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;web-browsing&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;So I would recommend you a rule like your vSphere clients to your vCenter server with applications ssl and web-browsing on any service.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;In cases where I have no idea I create a rule with the client, server addresses, service any and application any. Then I monitor this rule. You can do this very easy by clicking on the application and change the ‘eq’ to ‘neq’. If you find no log entries anymore you have the list of needed applications. Enter these applications in a new rule before your monitoring rule and with service application-default. Verify your rule by controlling your monitoring rule, there should be no new entry anymore. If so you can delete the monitoring rule and you are ready.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN lang="EN-US" style="mso-ansi-language: EN-US"&gt;Best regards,&lt;BR /&gt;Florian&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jun 2011 12:33:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45754#M33633</guid>
      <dc:creator>siebi</dc:creator>
      <dc:date>2011-06-15T12:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: Comprehensive IANA service port listings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45755#M33634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can certainly see the value of the monitor tab in the UI, it's very nice. What is troubling is the number of applications reported as "insufficient data" or "not applicable".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would seem to me that VMWare View is a popular enough application that there should be some sort of signature for it (PcoIP, etc) and not just the ESX server heartbeat port (902). I guess it's just a learning curve I will have to deal with on this device. Hopefully the training course isn't delayed again. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jun 2011 17:38:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/comprehensive-iana-service-port-listings/m-p/45755#M33634</guid>
      <dc:creator>bjaming</dc:creator>
      <dc:date>2011-06-15T17:38:15Z</dc:date>
    </item>
  </channel>
</rss>

