<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: app web-browsing not allowing soap after 545 update. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/69776#M40386</link>
    <description>&lt;P&gt;We had the same issue. The fix was also&amp;nbsp;allowing SOAP on the security policy, in addition to web-browsing. We also rolled the app and content update back to version 544-3039 (from 12/8/2015) and only allowed web-browsing as the app. This fixed it, too, confirming the problem was&amp;nbsp;how&amp;nbsp;SOAP was identified&amp;nbsp;in version 545. I opened a case with Palo Alto to see if there was any further detail about what was changed. Turns out they consider what they changed as a fix because SOAP traffic wasn't being properly ID'd before as that and was showing up as web-browsing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What this'll probably end up causing though for us in the long run is disabling automatic updates like this in production and testing them out in a non-production environment first. Honestly surprised this sort of thing hasn't happened to us before.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Good ideas to write allow policies based on port as a "safeguard." However,&amp;nbsp;doesn't that allow any app on the defined&amp;nbsp;port to get through?&amp;nbsp;I guess it's a tradeoff between security and functionality...&lt;/P&gt;</description>
    <pubDate>Tue, 22 Dec 2015 19:14:03 GMT</pubDate>
    <dc:creator>Bwilli</dc:creator>
    <dc:date>2015-12-22T19:14:03Z</dc:date>
    <item>
      <title>app web-browsing not allowing soap after 545 update.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/69643#M40353</link>
      <description>Application and Threat Content Release Notes  Version 545 had a modification on an app for SOAP. We had a rule that was allowing users for the app 'web-browsing' and now it is showing them denied using Application soap on port 80. The users are app developers using visual studio. They are fixed now by allowing on a new rule for service port 80. 
Thats more or less a FYI, my question is:
 If you have a rule with a group of apps and instead of using the service 'application-default' you add a port, will the apps use its default ports AND that service port OR the apps will try to use ONLY that listed service port ?</description>
      <pubDate>Fri, 18 Dec 2015 17:09:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/69643#M40353</guid>
      <dc:creator>rrowe</dc:creator>
      <dc:date>2015-12-18T17:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: app web-browsing not allowing soap after 545 update.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/69661#M40355</link>
      <description>&lt;P&gt;Lets assume you have 2 applications in one rule "web-bworsing" and "ssl".&lt;/P&gt;
&lt;P&gt;If you use application-default as service then web-browsing runs on 80 and ssl runs on 443 only.&lt;/P&gt;
&lt;P&gt;If you create 2 new services tcp-80 and tcp-443 (there are preconfigured services actually for http and https) and change&amp;nbsp;application-default to those 2 services then web-browsing can run on 80 and 443 and same with ssl - can run on 80 and 443.&lt;/P&gt;
&lt;P&gt;Basically there are AND between columns and OR between rows in single policy.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2015 21:25:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/69661#M40355</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2015-12-18T21:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: app web-browsing not allowing soap after 545 update.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/69716#M40368</link>
      <description>&lt;P&gt;I have/had the same issue. &amp;nbsp;Two rules, one inbound and one outbound allowed the App ID's "ssl" and "web-browsing". &amp;nbsp;On the 17/18th they broke because they were being denied on port 80 App ID "soap".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Changing the rules to ports (80/443) fixed the problem. &amp;nbsp;Final solution was to go back to App ID and allow "ssl", "web-browsing" and "soap".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a good way to be notified when this kind of change (App ID change?) happens?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 21 Dec 2015 23:46:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/69716#M40368</guid>
      <dc:creator>clindloff</dc:creator>
      <dc:date>2015-12-21T23:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: app web-browsing not allowing soap after 545 update.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/69759#M40378</link>
      <description>Maybe this could be a feature request.
If I had a lot of apps using app-default svcs, then a request for a special port needs to be added, then its either a new rule or add all ports for all apps listed for the rule, which could be easy to miss something..
Thanks..</description>
      <pubDate>Tue, 22 Dec 2015 14:40:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/69759#M40378</guid>
      <dc:creator>rrowe</dc:creator>
      <dc:date>2015-12-22T14:40:26Z</dc:date>
    </item>
    <item>
      <title>Re: app web-browsing not allowing soap after 545 update.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/69761#M40379</link>
      <description>Are you subscribed to the updates@paloaltonetworks.com ?   &lt;A href="http://support.paloaltonetworks.com/" target="_blank"&gt;http://support.paloaltonetworks.com/&lt;/A&gt;
Thats where I got an email on the 'Modified Applications' But still had to put 2 and 2 together to troubleshoot. If the dev team didnt know to ask for ANY changes, they could have spent days debugging their code, etc...
Its hard to tell what is affected when such a HTTP decoder is modified too..
FYI...</description>
      <pubDate>Tue, 22 Dec 2015 14:46:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/69761#M40379</guid>
      <dc:creator>rrowe</dc:creator>
      <dc:date>2015-12-22T14:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: app web-browsing not allowing soap after 545 update.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/69776#M40386</link>
      <description>&lt;P&gt;We had the same issue. The fix was also&amp;nbsp;allowing SOAP on the security policy, in addition to web-browsing. We also rolled the app and content update back to version 544-3039 (from 12/8/2015) and only allowed web-browsing as the app. This fixed it, too, confirming the problem was&amp;nbsp;how&amp;nbsp;SOAP was identified&amp;nbsp;in version 545. I opened a case with Palo Alto to see if there was any further detail about what was changed. Turns out they consider what they changed as a fix because SOAP traffic wasn't being properly ID'd before as that and was showing up as web-browsing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What this'll probably end up causing though for us in the long run is disabling automatic updates like this in production and testing them out in a non-production environment first. Honestly surprised this sort of thing hasn't happened to us before.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Good ideas to write allow policies based on port as a "safeguard." However,&amp;nbsp;doesn't that allow any app on the defined&amp;nbsp;port to get through?&amp;nbsp;I guess it's a tradeoff between security and functionality...&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2015 19:14:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/69776#M40386</guid>
      <dc:creator>Bwilli</dc:creator>
      <dc:date>2015-12-22T19:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: app web-browsing not allowing soap after 545 update.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/70374#M40496</link>
      <description>&lt;P&gt;"However,&amp;nbsp;doesn't that allow any app on the defined&amp;nbsp;port to get through?"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes it does. &amp;nbsp;This is one of the big reasons we got rid of our ASA's and moved to the PAN products. &amp;nbsp;We try to use App ID for every Security rule and we are proabably 90% there.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2016 19:22:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-web-browsing-not-allowing-soap-after-545-update/m-p/70374#M40496</guid>
      <dc:creator>clindloff</dc:creator>
      <dc:date>2016-01-05T19:22:17Z</dc:date>
    </item>
  </channel>
</rss>

