<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Policy question setting application and services in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-question-setting-application-and-services/m-p/127520#M46607</link>
    <description>&lt;P&gt;Very good video tutorial:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Configuring-Your-Security-Policy/ta-p/78659" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Featured-Articles/Configuring-Your-Security-Policy/ta-p/78659&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;APP-ID should recognise&amp;nbsp;application even if it is running on the standard&amp;nbsp;ports or pretend to be another application. It checks for signature etc., not just port numbers.&lt;/P&gt;&lt;P&gt;I do not advise you to allow anything initiated from the&amp;nbsp;Untrust (Internet) zone &amp;gt; Trust zone (unless you want your internal server to be accessible from the&amp;nbsp;Internet)&lt;/P&gt;</description>
    <pubDate>Sat, 19 Nov 2016 09:51:08 GMT</pubDate>
    <dc:creator>TranceforLife</dc:creator>
    <dc:date>2016-11-19T09:51:08Z</dc:date>
    <item>
      <title>Security Policy question setting application and services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-question-setting-application-and-services/m-p/127512#M46606</link>
      <description>&lt;P&gt;Hello, in the security policy that is setup. Is it best to set the application and services the same?&lt;/P&gt;&lt;P&gt;So this will help keep that security policy safe from outside device try to see what other application can be use on that security policy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;example would be a nmap script using get commands with additionals handshakes in the script, so the logging would look like&amp;nbsp;&lt;/P&gt;&lt;P&gt;zone untrust zone trust source 1.1.1.1 dest 2.2.2.2 port 80 application is portmapper action is allow&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you set the security policy to allow untrust zone to trust zone with application any services 80 and 443.&amp;nbsp;&lt;/P&gt;&lt;P&gt;could this be use as a DOS attack if the application is not set the same as services is?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 19:15:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-question-setting-application-and-services/m-p/127512#M46606</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2016-11-18T19:15:42Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy question setting application and services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-question-setting-application-and-services/m-p/127520#M46607</link>
      <description>&lt;P&gt;Very good video tutorial:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Configuring-Your-Security-Policy/ta-p/78659" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Featured-Articles/Configuring-Your-Security-Policy/ta-p/78659&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;APP-ID should recognise&amp;nbsp;application even if it is running on the standard&amp;nbsp;ports or pretend to be another application. It checks for signature etc., not just port numbers.&lt;/P&gt;&lt;P&gt;I do not advise you to allow anything initiated from the&amp;nbsp;Untrust (Internet) zone &amp;gt; Trust zone (unless you want your internal server to be accessible from the&amp;nbsp;Internet)&lt;/P&gt;</description>
      <pubDate>Sat, 19 Nov 2016 09:51:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-question-setting-application-and-services/m-p/127520#M46607</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-11-19T09:51:08Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy question setting application and services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-question-setting-application-and-services/m-p/129373#M46763</link>
      <description>&lt;P&gt;Sorry for the late reply on this.&lt;/P&gt;&lt;P&gt;I did watch this video before posting a question, I did see it is a good idea to make sure set application.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can not setting Application be used a DOS attack, will it make the processors work harder to determined what application it is?&amp;nbsp;&lt;/P&gt;&lt;P&gt;If so could that lead to breaking Palo Alto device?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2016 19:22:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-question-setting-application-and-services/m-p/129373#M46763</guid>
      <dc:creator>AdamCoombs</dc:creator>
      <dc:date>2016-11-28T19:22:25Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy question setting application and services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-question-setting-application-and-services/m-p/129381#M46764</link>
      <description>&lt;P&gt;The application inspection is actually one of the leading reasons that people buy a Palo Alto product, and while it does but an increase load under the processor it is something that they are designed to allow. Further, the Palo Alto can actually be better at mitegratting a DoS attack when setup properly because it can drop packets for applications that you do not have publically available.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are worried about a DoS attack I would recommend that you setup DoS Profiles and Zone Protection profiles on your untrust interface; both of these will allow you to not only be alerted when you have a potential DoS attempt, but will automatically start to drop packets if your set limits are exceeded.&amp;nbsp;&lt;/P&gt;&lt;P&gt;To point out as well, the PA firewall will actually stop doing application inspection if your processor reaches a certain percentage on new requests. This feature is to allow the firewall to continue to pass traffic and not 'lock up' because it's busy decrypting and analyzing the applicaiton.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2016 20:31:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-question-setting-application-and-services/m-p/129381#M46764</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-11-28T20:31:22Z</dc:date>
    </item>
  </channel>
</rss>

