<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Custom Application ports secure at Layer 7? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152063#M50311</link>
    <description>&lt;P&gt;So I imagine that your custom application is simply made so that you actually have an application to override *to*. Your custom app-id likely won't actually match the traffic by itself. Take a look at the signatures and maybe attempt to find out if your custom application will actually match traffic or not; if you have an application override policy in place then you likely actually don't have the app-id setup correctly.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 10 Apr 2017 20:08:30 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2017-04-10T20:08:30Z</dc:date>
    <item>
      <title>Custom Application ports secure at Layer 7?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/151985#M50290</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have created an Application override and custom Application for SIP and RTP traffic.&amp;nbsp; We also have Security/NAT rules that allow only this application (ports 5060, 5061, and 6000-8000) access to an internal VM with public IP directly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I am still learning PA, wanted to ask.&amp;nbsp; Since we are using an Application (and override) that we created to open these ports, does PA still protect at the Application layer 7?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will PA reject traffic from any other application to this server destination that may be using these same ports (maliciously)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Application override policy rule.&amp;nbsp; Added ports 6000-8000.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SIP1.jpg" style="width: 474px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8726i470BCBB809C11CFD/image-dimensions/474x166/is-moderation-mode/true?v=v2" width="474" height="166" role="button" title="SIP1.jpg" alt="SIP1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Application itself.&amp;nbsp; Added ports 6000-8000&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SIP2.jpg" style="width: 297px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8727iBDA109B2CC855A44/image-dimensions/297x187/is-moderation-mode/true?v=v2" width="297" height="187" role="button" title="SIP2.jpg" alt="SIP2.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security rule for Inbound SBC traffic.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pasbcrule.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8728i099FA7BA904848DD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="pasbcrule.jpg" alt="pasbcrule.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT rule for Inbound SBC traffic.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PAnatrule.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8729i1017CC8A37048A18/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PAnatrule.jpg" alt="PAnatrule.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2017 17:29:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/151985#M50290</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-04-10T17:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application ports secure at Layer 7?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152027#M50300</link>
      <description>&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Custom-applications-and-app-override/ta-p/71635" target="_self"&gt;These&lt;/A&gt; &lt;A href="https://live.paloaltonetworks.com/t5/Learning-Articles/Tips-amp-Tricks-How-to-Create-an-Application-Override/ta-p/65513" target="_self"&gt;two&lt;/A&gt; articles are a good start. PA will not use an app-id scanner for any override application. Your&amp;nbsp;app simply will be identified&amp;nbsp;based on matching UDP port (you told PA identify your&amp;nbsp;app based on layer 4 TCP/UDP ports by creating app override rule). Your security profiles&amp;nbsp;l believe&amp;nbsp;still will take an action on allow&amp;nbsp;traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2017 18:09:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152027#M50300</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-04-10T18:09:24Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application ports secure at Layer 7?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152048#M50305</link>
      <description>&lt;P&gt;So there's a lot going on here, so please feel free to correct me on anything I may be misunderstanding here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First and foremost, by using an application override policy, that traffic is now exempt from _both_ AppID and ContentID inspection. So yes, you lose layer 7 protection by using the application override policy. If it was strictly a custom App, it would still be subject to ContentID.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(ETA: I'm struggling to find the exact phrasing as such anywhere, but I am fairly confident this is the case. The closest I could find is this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An application override with a custom application will prevent the session from being processed by the App-ID engine, which is a Layer-7 inspection. Instead&lt;STRONG&gt; it forces the firewall to handle the session as a regular stateful inspection firewall at Layer-4&lt;/STRONG&gt;, and thereby saves application processing time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;from &lt;A href="https://www.paloaltonetworks.com/documentation/60/pan-os/pan-os/app-id/manage-custom-or-unknown-applications.html" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/60/pan-os/pan-os/app-id/manage-custom-or-unknown-applications.html&lt;/A&gt; )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Second, barring being more specific with source/destination, any traffic using those UDP ports will be automatically identified as the app and subsequently not inspected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you need to be very careful about this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A custom App is the best approach. If you can correctly identify signatures in the traffic so the PA can reliably identify it as your custom app, you will have full protection.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2017 19:49:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152048#M50305</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-10T19:49:08Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application ports secure at Layer 7?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152050#M50306</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/58582"&gt;@bradk14&lt;/a&gt;&amp;nbsp;Good point regarding the security profiles. I must say l am not sure if security profiles actually taking an action with the policy override option or not. I can see you do have an option to use them&amp;nbsp;while creating your&amp;nbsp;custom app:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="APP.PNG" style="width: 775px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8737iFA39B6FB3024BBD3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="APP.PNG" alt="APP.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But when your&amp;nbsp;traffic is matching the app override policy (your&amp;nbsp;custom app) not sure if only app-id stops doing&amp;nbsp;identification or as well as security profiles withing the&amp;nbsp;normal policy also ignored.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2017 19:53:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152050#M50306</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-04-10T19:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application ports secure at Layer 7?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152051#M50307</link>
      <description>&lt;P&gt;As usual, thank you so much for your feedback, and so timely.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This Application and override was already in place when I arrived.&lt;/P&gt;&lt;P&gt;Based on feedback and my reading today, thinking of these questions now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why do we even have an Application override in this case?&amp;nbsp; Could we just use the custom Application we created?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to confirm, given the fact we are using an Application override, means that technically not as secure for these ports&amp;nbsp;since there is no App-ID associated with it, correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you guys have additional feedback would be appreciated.&amp;nbsp; Thanks again.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2017 19:54:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152051#M50307</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-04-10T19:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application ports secure at Layer 7?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152062#M50310</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37163"&gt;@TranceforLife&lt;/a&gt;_technically_ the security profiles would 'work' for an application override, but since there is no layer 7 inspection, they won't have any effect. it's like assigning security profiles to a deny policy (only it's being allowed).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;Just to confirm, given the fact we are using an Application override, means that technically not as secure for these ports&amp;nbsp;since there is no App-ID associated with it, correct?&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56398"&gt;@OMatlock&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe it's worse than that. You are assigning an app to it, so if someone were to send syslog over 7000 for example, it would become BroadVoice-SIP and be sent to the fastpath. So there's a trickle down effect in that logs would be incorrect, as an example, your security policies may not be applied appropriately depending on their order, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Absolutely the best course of action is always a custom app (without the override policy), but it's also the most challenging (but if it's already been done for you, then run with it). Actually the best course of action would be to submit a request to PA to create an app, but if it's inhouse or a standard app using non-standard ports, they won't be as inclined to to indulge the request.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2017 20:08:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152062#M50310</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-10T20:08:53Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application ports secure at Layer 7?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152063#M50311</link>
      <description>&lt;P&gt;So I imagine that your custom application is simply made so that you actually have an application to override *to*. Your custom app-id likely won't actually match the traffic by itself. Take a look at the signatures and maybe attempt to find out if your custom application will actually match traffic or not; if you have an application override policy in place then you likely actually don't have the app-id setup correctly.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2017 20:08:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152063#M50311</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-04-10T20:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application ports secure at Layer 7?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152064#M50312</link>
      <description>&lt;P&gt;You all typing quicker than l do :0 Yeah my understanding is if you create a custom app, without actually putting any signatures etc, purely based on ports - your traffic will not match as app-id engine will try to identify&amp;nbsp;the traffic and will look not only at the&amp;nbsp;ports.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Apr 2017 20:15:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152064#M50312</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-04-10T20:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application ports secure at Layer 7?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152202#M50351</link>
      <description>&lt;P&gt;Thank folks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am getting a better idea of how its working.&lt;/P&gt;&lt;P&gt;There are no signatures configured for this Custom Application.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I thinking that&amp;nbsp;since an&amp;nbsp;Application override was created this custom&amp;nbsp;Application would not do App-ID processing.&lt;/P&gt;&lt;P&gt;Therefore, this traffic is&amp;nbsp;not identified at Layer 7 and only&amp;nbsp;doing Layer 4 processing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sounds like I would need to go through the process of reading traffic and creating signatures for the custom Application if we want it secure at Layer 7.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Apr 2017 16:18:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152202#M50351</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-04-11T16:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application ports secure at Layer 7?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152203#M50352</link>
      <description>&lt;P&gt;Last question(s) on this point.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since we have rules that&amp;nbsp;specifiy the source and destination&amp;nbsp;IP addresses specifically for these ports and traffic, would that be our only exposure?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I mean, this path could only be compromised by the source IPs defined, correct?&amp;nbsp; Therefore limiting our exposure if we wanted to live with the Application override (and lack of Layer 7 inspection)?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Apr 2017 16:31:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152203#M50352</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-04-11T16:31:29Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application ports secure at Layer 7?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152220#M50357</link>
      <description>&lt;P&gt;yes, your security policy is your first line of defense and will restrict traffic accordingly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Apr 2017 18:31:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152220#M50357</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-11T18:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application ports secure at Layer 7?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152247#M50362</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56398"&gt;@OMatlock&lt;/a&gt;&amp;nbsp;to add to what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/58582"&gt;@bradk14&lt;/a&gt;&amp;nbsp;said some admins that don't have experiance building application sigantures will use this as a work around, and depending on the security of the application and the subset of devices that are listed in the security policy application override is a perfectly acceptable process.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I created a custom application for everything our dev team whipped up then I would need at least two other people that were actually capable of creating signatures for everything.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Apr 2017 19:54:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152247#M50362</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-04-11T19:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application ports secure at Layer 7?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152263#M50366</link>
      <description>&lt;P&gt;Thank you for that.&amp;nbsp; I think that is what happened here.&amp;nbsp; Instead of creating a signature, they created an override, which would therefore remove that traffic from App-ID processing.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Apr 2017 20:15:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-application-ports-secure-at-layer-7/m-p/152263#M50366</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-04-11T20:15:16Z</dc:date>
    </item>
  </channel>
</rss>

