<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL decryption and AppID in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64042#M38468</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;thank you for your extensive answers, much appreciated and helped me to understand the behavior. I also found a KB article about it:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/After-Configuring-SSL-Decryption-Web-Browsing-Sessions-Do-Not/ta-p/53040" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/After-Configuring-SSL-Decryption-Web-Browsing-Sessions-Do-Not/ta-p/53040&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I wish you could configure SSL decryption in a way that it does not change the AppID but just scans for threats and viruses in the content. Like this it makes large rulesets even larger and more complicated.&lt;/P&gt;</description>
    <pubDate>Wed, 02 Sep 2015 19:03:13 GMT</pubDate>
    <dc:creator>Anon1</dc:creator>
    <dc:date>2015-09-02T19:03:13Z</dc:date>
    <item>
      <title>SSL decryption and AppID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/63994#M38432</link>
      <description>&lt;P&gt;Today we use "ssl" AppID in firewall rules. In case we would enable SSL decryption, is it needed to add the AppIDs of the decrypted traffic to the firewall rules, e.g. web-browsing, java, flash, or is the AppID staying "ssl" even when traffic is decrypted?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2015 12:51:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/63994#M38432</guid>
      <dc:creator>Anon1</dc:creator>
      <dc:date>2015-09-02T12:51:32Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption and AppID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/63998#M38435</link>
      <description>&lt;P&gt;with decryption, SSL will become another application so you will have to update the rule.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2015 13:33:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/63998#M38435</guid>
      <dc:creator>cpainchaud</dc:creator>
      <dc:date>2015-09-02T13:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption and AppID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64013#M38446</link>
      <description>&lt;P&gt;This behavior makes no sense to me. In this case the rule would then e.g. have ssl+web-browsing, and&amp;nbsp;I cannot use "service = application-default" because it would then allow also port 80, which I don´t want. It would also allow unencrypted traffic to the target server which I don´t want either.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2015 15:23:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64013#M38446</guid>
      <dc:creator>Anon1</dc:creator>
      <dc:date>2015-09-02T15:23:26Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption and AppID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64026#M38454</link>
      <description>&lt;P&gt;i'm not sure i understand your rationale.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you enable web-browsing and "application-default" then plaintext html based traffic will be allowed on port 80 and 8080.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you don't want unencrypted traffic to the target server, don't allow it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2015 17:02:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64026#M38454</guid>
      <dc:creator>cramman</dc:creator>
      <dc:date>2015-09-02T17:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption and AppID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64028#M38456</link>
      <description>&lt;P&gt;Hi Anon1,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;let me try to explain it from the other angle &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once your traffic is decrypted, such sessions will not have application ssl but will be whatever they are; for example:&lt;/P&gt;&lt;P&gt;- if your user was browsing https encrypted page, and it is decrypted, it becomes web-browsing,&lt;/P&gt;&lt;P&gt;- if your user was listening to youtube music, after decryption, instead of ssl such stream will be youtube app,&lt;/P&gt;&lt;P&gt;- if your user was browsing facebook and their session is decrypted, app will be facebook-base,&lt;/P&gt;&lt;P&gt;- if you were accessing Nagios over the https it will become app nagios after decryption....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please take all examples of final application above with a grain of salt, I just typed it out of my head and was guessing application names. I am trying to illustrate that previously encrypted session contents were tagged as ssl application, but now they are becoming plain-text (after decryption) and firewall will evaluate applications for whatever they are.&lt;/P&gt;&lt;P&gt;Implicitly, previous security and other policies for ssl traffic now have to include whatever apps those become after decryption (if you want to hit the same rule, right?)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bottom line is, ff it is decrypted, it will not be ssl anymore and it will be different app, so you will have to adjust your security policies to reflect such change in traffic visibility. Does it make sense with this explanation, a bit more? I just re-explained what &lt;SPAN class="UserName lia-user-name lia-user-rank-L4-Transporter"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/13836" target="_self"&gt;&lt;SPAN class=""&gt;cpainchaud&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt; wrote. In such case, you need to enable decryption and use application that you expect it to become.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now, I will not remove top part of the text but I have re-read your question, and from your second post it seems that you are trying actually to have inbound decryption for the server that is hosted on your side? If that is the case, it will be a bit more complex: you need to allow ssl from Untrust to Untrust and to that specific public IP address in one policy, and in another you need to allow application from Untrust towards the DMZ and local IP with the app you expect (web-browsing?). You don't need to use "any" app anywhere, but you need two rules: one for incoming encrypted flow (allow ssl) hitting public IP on the firewall, and another rule for specific application (allow web-browsing? citrix? whatever) towards the private IP in the DMZ (whatever inside zone you have).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know if I completely misunderstood everything &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Luciano&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2015 17:35:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64028#M38456</guid>
      <dc:creator>Lucky</dc:creator>
      <dc:date>2015-09-02T17:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption and AppID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64031#M38459</link>
      <description>&lt;P&gt;Hi Lucky,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does that mean the rule for the decrypted traffic should not use "application-default", since the decrypted traffic is still on port 443 and not the default port 80 for web-browsing? Or is the firewall smart enough to refer to the original encrypted traffic when we refer to that service?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Benjamin&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2015 18:11:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64031#M38459</guid>
      <dc:creator>BenjAudy.MTL</dc:creator>
      <dc:date>2015-09-02T18:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption and AppID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64034#M38462</link>
      <description>&lt;P&gt;Hi Benjamin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not completely sure now what direction are we talking about &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; In any case, I would try with application-default service and if that does not work I would change service to any or try to investigate a bit more why does that exactly happen.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Copied from help of the firewall (I open that question mark so often to check things):&lt;/P&gt;&lt;P&gt;&lt;SPAN class="Bold"&gt;application-default&lt;/SPAN&gt;&lt;SPAN class="Bold"&gt;—&lt;/SPAN&gt;The selected applications are allowed or denied only on their default &lt;SPAN class="Bold"&gt;ports defined by Palo Alto Networks&lt;/SPAN&gt;. This option is recommended for allow policies because it prevents applications from running on unusual ports and protocol which, if not intentional, can be a sign of undesired application behavior and usage.&lt;BR /&gt;Note that when you use this option, the device still checks for all applications on all ports but, with this configuration, applications are only allowed on their default ports and protocols.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, with above in mind, again - if you did not change ports intentionally or go exotic with your setups, I think application-default would work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Small disclaimer: I am still reluctant or a bit uncomfortable to make such general recommendation in either direction, I would rather help in understanding and everyone makes their own decisions at the end. We are all trying to enhance security of our networks here, and that means taking any recommendation with grain of salt and thinking how does it apply to your network.... I think it depends a lot on the granulation of the rules... for my home I have crude and rudimentary config, for work I always pay much more attention and spend more time thinking about it.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2015 18:29:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64034#M38462</guid>
      <dc:creator>Lucky</dc:creator>
      <dc:date>2015-09-02T18:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption and AppID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64042#M38468</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;thank you for your extensive answers, much appreciated and helped me to understand the behavior. I also found a KB article about it:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/After-Configuring-SSL-Decryption-Web-Browsing-Sessions-Do-Not/ta-p/53040" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/After-Configuring-SSL-Decryption-Web-Browsing-Sessions-Do-Not/ta-p/53040&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I wish you could configure SSL decryption in a way that it does not change the AppID but just scans for threats and viruses in the content. Like this it makes large rulesets even larger and more complicated.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2015 19:03:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64042#M38468</guid>
      <dc:creator>Anon1</dc:creator>
      <dc:date>2015-09-02T19:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption and AppID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64051#M38473</link>
      <description>&lt;P&gt;Hey Anon1,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no problem. Thanks for sharing the link - it turns out I was wrong baudy, chances are you will have problems leaving it as application-default, it needs to be changed to either app you need or to any.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anon1 - don't be discouraged, if it is inbound than it's ok and easy - it will be only one app and you already know what is it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In your case, considering your last link, it is outbound decryption - than, treat it as you treated it before, no additional rules are required? Because, now that you decrypt it does not mean you need to work more, it only means that you see more of your traffic. Same rules as before will apply (provided you change once from application default to individual applications in sec. policies or create an app group to ease that process if you will re-use app list). It requires _some_ work, in the worst case creating an app group and adding apps you needed once. Than in the rest of the rules only a small change is needed, from application default to your custom application list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2015 19:22:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/64051#M38473</guid>
      <dc:creator>Lucky</dc:creator>
      <dc:date>2015-09-02T19:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption and AppID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/397388#M91472</link>
      <description>&lt;P&gt;Sorry ONLY port 80 is allowed when the app is web-browsing&amp;nbsp;&lt;A href="https://applipedia.paloaltonetworks.com/" target="_blank"&gt;https://applipedia.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;the decrypted traffic will be identified as web-browsing on port 443 and be denied unless a custom ssl is also permitted in the rule&lt;/P&gt;</description>
      <pubDate>Tue, 13 Apr 2021 00:33:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/397388#M91472</guid>
      <dc:creator>gary.paybins</dc:creator>
      <dc:date>2021-04-13T00:33:01Z</dc:date>
    </item>
    <item>
      <title>Re: SSL decryption and AppID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/540590#M110868</link>
      <description>&lt;P&gt;If anyone is still researching this topic, the behavior was changed in 9.0.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmdLCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmdLCAS&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 May 2023 12:26:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-decryption-and-appid/m-p/540590#M110868</guid>
      <dc:creator>DustinS.</dc:creator>
      <dc:date>2023-05-01T12:26:13Z</dc:date>
    </item>
  </channel>
</rss>

