<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hardening the security rule for service ports in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/124598#M46335</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper﻿&lt;/a&gt;&amp;nbsp;you are man ! Can I use PAN-Configrator to get the same result? I mean run against each rule and gets the ports from logs?&lt;/P&gt;</description>
    <pubDate>Mon, 07 Nov 2016 12:01:37 GMT</pubDate>
    <dc:creator>ghostrider</dc:creator>
    <dc:date>2016-11-07T12:01:37Z</dc:date>
    <item>
      <title>Hardening the security rule for service ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/124403#M46309</link>
      <description>&lt;P&gt;Hello Experts&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my firewall configuration, many security rules have specific application but service ANY. I would like to harden service part as well. Once I veiw the logs for particular security rule to check service ports, there are many pages, I have to manually go. Is there any way I can generate the report for that particular security rule for service ports OR there is any script I can run against paritcular security rule to pull all the service ports (destination ports) from logs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciated your reply&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Nov 2016 16:00:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/124403#M46309</guid>
      <dc:creator>ghostrider</dc:creator>
      <dc:date>2016-11-06T16:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening the security rule for service ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/124568#M46320</link>
      <description>&lt;P&gt;you could try a custom report like below, then verify where applications are using 'abnormal' ports (because for those applications you will need to build custom service ports) and set all the rules where the applications use their default ports to service 'application default'&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2016-11-07_10-27-06.png"&gt;&lt;img src="https://live.paloaltonetworks.com/skins/images/EAF30C9A5814E020FF754681AA726920/responsive_peak/images/image_not_found.png" alt="2016-11-07_10-27-06.png" /&gt;&lt;/span&gt;﻿&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here's a little &lt;A href="https://www.youtube.com/watch?v=oUdqQSRyMis" target="_blank"&gt;video on security policy optimization&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2016 09:35:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/124568#M46320</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-11-07T09:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening the security rule for service ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/124598#M46335</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper﻿&lt;/a&gt;&amp;nbsp;you are man ! Can I use PAN-Configrator to get the same result? I mean run against each rule and gets the ports from logs?&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2016 12:01:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/124598#M46335</guid>
      <dc:creator>ghostrider</dc:creator>
      <dc:date>2016-11-07T12:01:37Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening the security rule for service ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/124900#M46379</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper﻿&lt;/a&gt;&amp;nbsp;I would highly appreciate if you could recommend to convert SERVICE any to specific ports, how many days traffic logs are recommended? same for APPLICAITON any to specific application&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2016 09:47:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/124900#M46379</guid>
      <dc:creator>ghostrider</dc:creator>
      <dc:date>2016-11-08T09:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening the security rule for service ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/124905#M46381</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42397"&gt;@ghostrider﻿&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;that's a tricky question &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would depend on how well you know your environment and how likely it is you encounter applications on 'weird' ports&lt;/P&gt;
&lt;P&gt;If your organization is running mostly 'the usual' mix of applications, it would be safe to assume 99.9% of all 'good' applications run on their default port, and a month's worth of log for due diligence would suffice. if your environment is highly dynamic and a lot of custom services/servers/applications are used, you may want to invest more time and go back 6 months to make sure you cover all your bases&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;depending on the complexity of your firewall, you can use 'double' security policies: rule 1 has applications and service set to application-default, rule 2 is the original policy and has any app, any port: anything that hits rule 2 and is ok can be added to rule 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this will only work in a not-too-complex deployment however &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2016 10:13:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/124905#M46381</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-11-08T10:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening the security rule for service ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/125064#M46391</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper﻿&lt;/a&gt;&amp;nbsp;Thanks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I run the report using for all rules having service any in qualifier and show the ports and applicaiton with rule name in filter but when I run the report, its just processing like became crazy &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Is there any script I can run for this purpose?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2016 20:05:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/125064#M46391</guid>
      <dc:creator>ghostrider</dc:creator>
      <dc:date>2016-11-08T20:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening the security rule for service ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/125228#M46402</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper﻿&lt;/a&gt;&amp;nbsp;The solution you gave, how I can run the report agains security rules who have SERVICE ANY?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 12:08:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/125228#M46402</guid>
      <dc:creator>ghostrider</dc:creator>
      <dc:date>2016-11-09T12:08:29Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening the security rule for service ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/125257#M46409</link>
      <description>&lt;P&gt;ehm, i guess you could use the query builder to limit the report to certain rules only, but there is no operator for 'service = any'&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2016-11-09_13-59-19.png"&gt;&lt;img src="https://live.paloaltonetworks.com/skins/images/EAF30C9A5814E020FF754681AA726920/responsive_peak/images/image_not_found.png" alt="2016-11-09_13-59-19.png" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 13:01:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/hardening-the-security-rule-for-service-ports/m-p/125257#M46409</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-11-09T13:01:48Z</dc:date>
    </item>
  </channel>
</rss>

