<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security policies: application vs service in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49085#M36161</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry I missed 'APPLICATIONS' in the above example. But same logic is applied for Applications as well. ie &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;(&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt;(Szn1 or Szn2 or...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; (Saddr1 or Saddr2 or...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; ( Susr1 or Susr2 or....) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; (Hp1 or Hp2 or...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; (Dzn1 or Dzn2 or...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; (Daddr1 or Daddr2 or ...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND &lt;/STRONG&gt;(App1 or App2 or ...) &lt;STRONG&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; (Srvc1 or Srvc2 or....) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; (Ctgry1 or Ctgry2 or...)&lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dileep&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 Oct 2014 22:49:23 GMT</pubDate>
    <dc:creator>dreputi</dc:creator>
    <dc:date>2014-10-22T22:49:23Z</dc:date>
    <item>
      <title>security policies: application vs service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49080#M36156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;how are application and service treated in &lt;STRONG&gt;a given policy&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;multiple apps in a policy?&lt;/P&gt;&lt;P&gt;multiple services in a policy?&lt;/P&gt;&lt;P&gt;apps and services in a policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how are the different scenarios &lt;STRONG&gt;and'ed&lt;/STRONG&gt; or &lt;STRONG&gt;or'ed&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Oct 2014 21:15:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49080#M36156</guid>
      <dc:creator>dthibodeaux</dc:creator>
      <dc:date>2014-10-22T21:15:08Z</dc:date>
    </item>
    <item>
      <title>Re: security policies: application vs service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49081#M36157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scenario-1:&lt;/P&gt;&lt;P&gt;Application - Web-browsing and service - any&lt;/P&gt;&lt;P&gt;In above policy firewall will allow traffic if it identified as web-browsing on any service&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scenario-2:&lt;/P&gt;&lt;P&gt;Application - web-browsing and service - application-default&lt;/P&gt;&lt;P&gt;In above policy firewall will allow traffic if identified as web-browsing and destined for port 80(default port for web browsing)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scenario-3:&lt;/P&gt;&lt;P&gt;Application - any and service - tcp/80&lt;/P&gt;&lt;P&gt;In above policy firewall will allow traffic if traffic is destined to port 80 irrespective of application&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it's like an AND operation between application and service.&lt;/P&gt;&lt;P&gt;Hope this hepls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hari Yadavalli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Oct 2014 21:34:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49081#M36157</guid>
      <dc:creator>hyadavalli</dc:creator>
      <dc:date>2014-10-22T21:34:06Z</dc:date>
    </item>
    <item>
      <title>Re: security policies: application vs service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49082#M36158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;The Application will be identified based on the application signature available on &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;database&lt;/SPAN&gt; or a custom application created by a user. So you may select multiple application on a given policy at the same time. The "service" option is a second layer of security to allow &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;application&lt;/SPAN&gt; on their well-known port &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;applicatipn&lt;/SPAN&gt; default) or any port &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;any).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have configured multiple "services" based on the port number, you can select only related application &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;on&lt;/SPAN&gt; the policy to allow that traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example: If you select an application as "web-browsing", and set service as " application default". The &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;pAN&lt;/SPAN&gt; firewall will only allow web-browsing traffic on TCP/80. But if you select &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;application&lt;/SPAN&gt; as "web-browsing" and service as any, it will allow &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;we&lt;/SPAN&gt;-browsing traffic on any TCP port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Oct 2014 21:36:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49082#M36158</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-10-22T21:36:31Z</dc:date>
    </item>
    <item>
      <title>Re: security policies: application vs service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49083#M36159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Services are port numbers in traditional firewall. Lets say on any other vendor firewall to allow "web-browsing" its required to allow port 80.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If some one tunnel gaming traffic in http header still that will be allowed in traditional firewall because that will flow on port 80.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To avoid this security violation, palo alto networks has application field in policy. In this scenario traffic will be identified as gaming traffic and it will be blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In palo alto networks firewall one has to specify both application and services. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Oct 2014 22:03:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49083#M36159</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-10-22T22:03:08Z</dc:date>
    </item>
    <item>
      <title>Re: security policies: application vs service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49084#M36160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello dthibodeaux,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can understand it this way:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In a security policy, the match will be for ((source zone, address ,user, hip, destination zone, address, service, URL category)). To this, the ACTION is applied ie allow/deny. If Security profiles are attached, then the ACTION will be based on decision taken by security profiles like url, threat etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source zone- SZn1, SZn2...(or Any)&lt;/P&gt;&lt;P&gt;source address- Saddr1, Saddr2...&lt;SPAN style="font-size: 13.6000003814697px;"&gt;(or Any)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;soure user- Susr1, Susr2...&lt;SPAN style="font-size: 13.6000003814697px;"&gt;(or Any)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;hip profile- Hp1, Hp2...&lt;SPAN style="font-size: 13.6000003814697px;"&gt;(or Any)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Destination zone- Dzn1, Dzn2....&lt;SPAN style="font-size: 13.6000003814697px;"&gt;(or Any)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Destination address- Daddr1, Daddr2....&lt;SPAN style="font-size: 13.6000003814697px;"&gt;(or Any)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Service- Srvc1, Srvc2...&lt;SPAN style="font-size: 13.6000003814697px;"&gt;(or Any)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;URL-Category - Ctgry1, Ctgry2...&lt;SPAN style="font-size: 13.6000003814697px;"&gt;(or Any)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Logic will be like this(Rule match is top to down approach):&lt;/P&gt;&lt;P&gt;RULE1:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;(&lt;/STRONG&gt;(Szn1 or Szn2 or...) &lt;STRONG&gt;AND&lt;/STRONG&gt; (Saddr1 or Saddr2 or...) &lt;STRONG&gt;AND&lt;/STRONG&gt; ( Susr1 or Susr2 or....) &lt;STRONG&gt;AND&lt;/STRONG&gt; (Hp1 or Hp2 or...) &lt;STRONG&gt;AND&lt;/STRONG&gt; (Dzn1 or Dzn2 or...) &lt;STRONG&gt;AND&lt;/STRONG&gt; (Daddr1 or Daddr2 or ...) &lt;STRONG&gt;AND&lt;/STRONG&gt; (Srvc1 or Srvc2 or....) &lt;STRONG&gt;AND&lt;/STRONG&gt; (Ctgry1 or Ctgry2 or...)&lt;STRONG&gt;)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RULE2:&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 13.6000003814697px;"&gt;(&lt;/STRONG&gt;&lt;SPAN style="font-size: 13.6000003814697px;"&gt;(Szn1 or Szn2 or...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 13.6000003814697px;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="font-size: 13.6000003814697px;"&gt; (Saddr1 or Saddr2 or...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 13.6000003814697px;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="font-size: 13.6000003814697px;"&gt; ( Susr1 or Susr2 or....) &lt;/SPAN&gt;&lt;STRONG style="font-size: 13.6000003814697px;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="font-size: 13.6000003814697px;"&gt; (Hp1 or Hp2 or...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 13.6000003814697px;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="font-size: 13.6000003814697px;"&gt; (Dzn1 or Dzn2 or...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 13.6000003814697px;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="font-size: 13.6000003814697px;"&gt; (Daddr1 or Daddr2 or ...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 13.6000003814697px;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="font-size: 13.6000003814697px;"&gt; (Srvc1 or Srvc2 or....) &lt;/SPAN&gt;&lt;STRONG style="font-size: 13.6000003814697px;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="font-size: 13.6000003814697px;"&gt; (Ctgry1 or Ctgry2 or...)&lt;/SPAN&gt;&lt;STRONG style="font-size: 13.6000003814697px;"&gt;)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 13.6000003814697px;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;To this match, the ACTION is applied based on security profiles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dileep&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Oct 2014 22:47:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49084#M36160</guid>
      <dc:creator>dreputi</dc:creator>
      <dc:date>2014-10-22T22:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: security policies: application vs service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49085#M36161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry I missed 'APPLICATIONS' in the above example. But same logic is applied for Applications as well. ie &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;(&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt;(Szn1 or Szn2 or...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; (Saddr1 or Saddr2 or...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; ( Susr1 or Susr2 or....) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; (Hp1 or Hp2 or...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; (Dzn1 or Dzn2 or...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; (Daddr1 or Daddr2 or ...) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND &lt;/STRONG&gt;(App1 or App2 or ...) &lt;STRONG&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; (Srvc1 or Srvc2 or....) &lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;AND&lt;/STRONG&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.8000001907349px;"&gt; (Ctgry1 or Ctgry2 or...)&lt;/SPAN&gt;&lt;STRONG style="font-size: 12.8000001907349px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dileep&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Oct 2014 22:49:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49085#M36161</guid>
      <dc:creator>dreputi</dc:creator>
      <dc:date>2014-10-22T22:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: security policies: application vs service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49086#M36162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hey&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;application and services in paloalto secyrity policy..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;leaving for a second the application part Paloalto should be like all other layer 4 FW so first the policy will build a "layer 4" security policy based on&lt;/P&gt;&lt;P&gt;source destenation and service and by this policy it will allow / block traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when you put in the applications part of the policy Paloalto should still build first a Layer 4 policy (that because application can only be recognized after certain amount of packets).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so first Paloalto will see a ip packet and will look for an allow rule in the built "layer 4" policy if a match is found for allow the PA will allow traffic to pass until it be able to recognize the application. &lt;/P&gt;&lt;P&gt;once the application is recognized the PA will check if the application is match on the rule, if it is not match it will look for other rulle that match both application and service port, if not found it will drop the traffic (this is why you may see traffic matched on not relevant rule)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so here you get paloalto addition to the services cullomn which is the application defaults so you almost shouldn't care on what ports application are running,&lt;/P&gt;&lt;P&gt;ACCEPT on allow rules:&lt;/P&gt;&lt;P&gt;1) the application usse&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; ANY ports&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;2) your application does not use default ports&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you put an allow rule with service any (or application defaults with application that use any service) remember that PA will first allow traffic based on the "Layer 4" policy so you will allow port scan to your resource untill the application is found.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in a deny rule it is important to e the ANY in the service because you want to block the application no matter the port is running on&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Oct 2014 07:05:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49086#M36162</guid>
      <dc:creator>minow</dc:creator>
      <dc:date>2014-10-23T07:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: security policies: application vs service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49087#M36163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;and also non tcp/usd application will not match on a rule with specific services (only any / application defaults)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so when building this Layer 4 policy on a rule with application defaults the PA will take all the ports in the application information&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Oct 2014 07:07:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49087#M36163</guid>
      <dc:creator>minow</dc:creator>
      <dc:date>2014-10-23T07:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: security policies: application vs service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49088#M36164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pay another attention on the "hirarchy" of an application and that during a session the PA may re-evaluate the recognized application based on the application configuration&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Oct 2014 07:19:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policies-application-vs-service/m-p/49088#M36164</guid>
      <dc:creator>minow</dc:creator>
      <dc:date>2014-10-23T07:19:07Z</dc:date>
    </item>
  </channel>
</rss>

