<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: blocking apps on non-default ports in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-apps-on-non-default-ports/m-p/146645#M49239</link>
    <description>&lt;P&gt;Long story short, reason for my doubt was&amp;nbsp;SSL, becuse decryption was done.&lt;/P&gt;&lt;P&gt;Basically, when SSL decryption succeeded, instead of seeing application ssl at TCP/443 as initially, Palo Alto saw application web-browsing at TCP/443 which is not the application-default port and due do that was blocking it, which is pretty much expected with this configuration.&lt;/P&gt;</description>
    <pubDate>Wed, 08 Mar 2017 13:44:23 GMT</pubDate>
    <dc:creator>nikoo</dc:creator>
    <dc:date>2017-03-08T13:44:23Z</dc:date>
    <item>
      <title>blocking apps on non-default ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-apps-on-non-default-ports/m-p/146091#M49135</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sadly don't have PA to play around at the moment, so have to pass this question for all you&amp;nbsp;out there as I'm sure I cannot be first one with such an idea.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best way to block apps on their non-default ports?&lt;/P&gt;&lt;P&gt;Basically, allow apps ONLY on their application-default ports. My first thought was like:&lt;/P&gt;&lt;P&gt;Rule1 - src: trust, dst: untrust, application: any, service: application-default, allow&lt;/P&gt;&lt;P&gt;Rule2 - src: trust, dst: untrust, application: any, service: any, deny&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But this way, due to rule processing sequence, as soon as PA seens Rule2 for new traffic, it does not go futher to App-ID, but block the traffic based on service.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the moment there is "permit all/catch all" rule before the default intra/inter-zone rules, but if that was not there, how would the default inter-zone rule (from trust to untrust for example) block the non-default port traffic for any app or would it still catch all based on the service before the App-ID and would not allow anything further?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Mar 2017 07:45:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-apps-on-non-default-ports/m-p/146091#M49135</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2017-03-06T07:45:49Z</dc:date>
    </item>
    <item>
      <title>Re: blocking apps on non-default ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-apps-on-non-default-ports/m-p/146124#M49142</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42773"&gt;@nikoo&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;your policy will work perfectly&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;rule processing hits on 'first match' and then stops&lt;/P&gt;
&lt;P&gt;this means that in the stage where app-id is not known yet, app-default will already have all ports open for the apps you defined in the application field&lt;/P&gt;
&lt;P&gt;- if you allow all applications on their default ports, in this stage all ports will be open (so in your case all tcp handshakes will be created into a session and App-ID becomes responsible for blocking applications)&lt;/P&gt;
&lt;P&gt;- if you only allow a handfull of apps, those ports will be open and the rest will be closed (already preventing tcp handshakes if the ports don't match)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;once the port matches the first rule, the session is accepted and app-id will kick in&lt;/P&gt;
&lt;P&gt;if then app-id identifies an application on a non-default port, the session will be discarded as it will not match the first rule anymore and the second one dictates a discard &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if your second rule were to be allow, this session, that was initially allowed to start on rule 1 (possibly due to port overlap, eg. smtp on tcp 80) would now be switched to rule 2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this helps&lt;/P&gt;</description>
      <pubDate>Mon, 06 Mar 2017 10:34:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-apps-on-non-default-ports/m-p/146124#M49142</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-03-06T10:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: blocking apps on non-default ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-apps-on-non-default-ports/m-p/146370#M49178</link>
      <description>&lt;P&gt;Hi, &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ok, thanks for assuring me, will look into why it is acting the way it is, because it seems like not hitting the correct rule then with the current deployment.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 12:04:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-apps-on-non-default-ports/m-p/146370#M49178</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2017-03-07T12:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: blocking apps on non-default ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-apps-on-non-default-ports/m-p/146645#M49239</link>
      <description>&lt;P&gt;Long story short, reason for my doubt was&amp;nbsp;SSL, becuse decryption was done.&lt;/P&gt;&lt;P&gt;Basically, when SSL decryption succeeded, instead of seeing application ssl at TCP/443 as initially, Palo Alto saw application web-browsing at TCP/443 which is not the application-default port and due do that was blocking it, which is pretty much expected with this configuration.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2017 13:44:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-apps-on-non-default-ports/m-p/146645#M49239</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2017-03-08T13:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: blocking apps on non-default ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-apps-on-non-default-ports/m-p/146657#M49244</link>
      <description>&lt;P&gt;good you got it figured out. one of the well documented banes of AppID and web browsing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for future reference:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/After-Configuring-SSL-Decryption-Web-Browsing-Sessions-Do-Not/ta-p/53040" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/After-Configuring-SSL-Decryption-Web-Browsing-Sessions-Do-Not/ta-p/53040&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2017 14:47:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-apps-on-non-default-ports/m-p/146657#M49244</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-03-08T14:47:33Z</dc:date>
    </item>
  </channel>
</rss>

