<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application Groups &amp;quot;service&amp;quot; in security policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/application-groups-quot-service-quot-in-security-policy/m-p/47886#M35199</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats right.&lt;/P&gt;&lt;P&gt;The warning is normal and can be ignored. There are many applications that also bring up this warning if you use a cleanup-rule as last rule.&lt;/P&gt;&lt;P&gt;In your scenario it shpuld work as expected like Narong explained.&lt;/P&gt;&lt;P&gt;You can use application default when working with application groups. Each application will then only work on its default port(s) that are defined in the application-default.&lt;/P&gt;&lt;P&gt;But why are you using a blacklist? If you define apps that are allowed, all other apps should be denied by default. You do not need a special deny rule. Only allowed traffic should flow.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 11 Jun 2014 08:01:08 GMT</pubDate>
    <dc:creator>kbe</dc:creator>
    <dc:date>2014-06-11T08:01:08Z</dc:date>
    <item>
      <title>Application Groups "service" in security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-groups-quot-service-quot-in-security-policy/m-p/47884#M35197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the following scenario I came across and just curious if this is expected behavior. It is recommended when "whitelisting" and application to use the application-default service (so it only works on its default port), or if you are "blacklisting" to use the service "any" (to block the app on any port used). I'm not so sure this works using groups though? Here is an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rule 1 - Allowed Exception During Lunch - YouTube - application-default - ALLOW&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rule 2 - Whitelist - Application Group which includes SSL etc... - application-default - ALLOW&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rule 3 - Blacklist - Application Group to Deny which includes SSL as part of a filter - any&amp;nbsp; - DENY&amp;lt;--use ANY service for deny rules&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I try to commit it gives me a warning that YouTube has a dependency of SSL, which is denied by the Blacklist rule. This doesn't make sense as SSL is allowed in rule 2 so therefore in my mind it "should" work. What am I missing? and when using application groups do you have to leave the service as "any" or can you use the application-default just fine and if you have a list of 5 applications, each one of those will only work on its respective default port.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2014 23:41:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-groups-quot-service-quot-in-security-policy/m-p/47884#M35197</guid>
      <dc:creator>froggyj</dc:creator>
      <dc:date>2014-06-10T23:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: Application Groups "service" in security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-groups-quot-service-quot-in-security-policy/m-p/47885#M35198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I recall that this issue is caused by the commit validation not expanding the search beyond the original rule. However this an error with the validation message, it will not affect the actual traffic. When a session is initiated it will first match the SSL application in Rule 2 and when APP-ID shifts to you-tube the traffic will then match Rule 1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Narong &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2014 03:30:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-groups-quot-service-quot-in-security-policy/m-p/47885#M35198</guid>
      <dc:creator>nchong</dc:creator>
      <dc:date>2014-06-11T03:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: Application Groups "service" in security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-groups-quot-service-quot-in-security-policy/m-p/47886#M35199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats right.&lt;/P&gt;&lt;P&gt;The warning is normal and can be ignored. There are many applications that also bring up this warning if you use a cleanup-rule as last rule.&lt;/P&gt;&lt;P&gt;In your scenario it shpuld work as expected like Narong explained.&lt;/P&gt;&lt;P&gt;You can use application default when working with application groups. Each application will then only work on its default port(s) that are defined in the application-default.&lt;/P&gt;&lt;P&gt;But why are you using a blacklist? If you define apps that are allowed, all other apps should be denied by default. You do not need a special deny rule. Only allowed traffic should flow.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2014 08:01:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-groups-quot-service-quot-in-security-policy/m-p/47886#M35199</guid>
      <dc:creator>kbe</dc:creator>
      <dc:date>2014-06-11T08:01:08Z</dc:date>
    </item>
  </channel>
</rss>

