<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Services in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153923#M50763</link>
    <description>&lt;P&gt;Forget http and https.&lt;/P&gt;&lt;P&gt;This has nothing to do with application but it is just how default built-in service object is called in firewall.&lt;/P&gt;&lt;P&gt;And Service is just port - nothing to do with Layer 7 application.&lt;/P&gt;&lt;P&gt;So if you permit Service called service-http then you permit tcp/80 and tcp/8080 and if you permit Service called service-https then you permit tcp/443.&lt;/P&gt;</description>
    <pubDate>Mon, 24 Apr 2017 19:05:23 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2017-04-24T19:05:23Z</dc:date>
    <item>
      <title>Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153864#M50739</link>
      <description>&lt;P&gt;Is there anyway in the traffic monitor, or the ACC or any other logs to see what services are being hit? I can see applications but not specifically services though to can add specific services in the rules&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 15:33:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153864#M50739</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-04-24T15:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153877#M50741</link>
      <description>&lt;P&gt;Not that I'm aware. You could just modify the port information since that essentially will determine the service; but the PA being application base the end-goal would really be to app-id all traffic and create custom app-ids where needed.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 16:07:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153877#M50741</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-04-24T16:07:06Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153879#M50742</link>
      <description>&lt;P&gt;By service you mean destination port?&lt;/P&gt;&lt;P&gt;If yes then just add this column into Monitor &amp;gt; Traffic view.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="port.PNG" style="width: 540px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8919i3D64BC8AF7BA588B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="port.PNG" alt="port.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 16:19:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153879#M50742</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-04-24T16:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153881#M50744</link>
      <description>&lt;P&gt;no I mean services, I have it set to show my port in my traffic monitor already, but I want to be sure what palo alto is defining as services since they give the option to add it in their rules I was surprised there was no option to filter by services&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 16:49:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153881#M50744</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-04-24T16:49:51Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153885#M50745</link>
      <description>&lt;P&gt;Service field under Policies &amp;gt; Security and is just destination port number.&lt;BR /&gt;If you want to filter traffic in Monitor &amp;gt; Traffic then just use filer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example filter below will show traffic towards port 443&lt;/P&gt;&lt;P&gt;( port.dst eq 443 )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="port2.PNG" style="width: 399px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8921iE8431FEEAA478DD3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="port2.PNG" alt="port2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 17:32:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153885#M50745</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-04-24T17:32:31Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153886#M50746</link>
      <description>&lt;P&gt;Services = port number (eg TCP port 80)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;you were quicker &amp;nbsp;:0&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 17:35:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153886#M50746</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-04-24T17:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153895#M50749</link>
      <description>&lt;P&gt;Okay&lt;/P&gt;&lt;P&gt;So if I have the application web-browsing or http are they alway port 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;or if I have https or ssl are they always port 443&lt;/P&gt;&lt;P&gt;I guess I am curious why it is interchangeable to either use the application or the the port&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 18:06:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153895#M50749</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-04-24T18:06:56Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153898#M50750</link>
      <description>&lt;P&gt;If you create policy to allow tcp/80 then this will allow any application that is capable of running over port 80 (even Skype).&lt;/P&gt;&lt;P&gt;If you allow application web-browsing and service application-default then web-browsing can run only on default port.&lt;/P&gt;&lt;P&gt;Now if you need to access website that runs on some random port then you need to create policy where application is web-browsing and service is destination port you need.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good example is if you decrypt SSL.&lt;/P&gt;&lt;P&gt;In this case first you need to permit SSL on default port that is 443.&lt;/P&gt;&lt;P&gt;Now if Palo removes decryption then inside SSL there is web-browsing.&lt;/P&gt;&lt;P&gt;But on what port it runs on? 443&lt;/P&gt;&lt;P&gt;So you need dedicated rule to allow web-browsing on tcp/443 as 443 is not in default list of web-browsing application.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So service is just port number.&lt;/P&gt;&lt;P&gt;Application is Layer 7 application identified by the firewall.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 18:15:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153898#M50750</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-04-24T18:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153909#M50752</link>
      <description>&lt;P&gt;Thats was a greate response Radio so what do you think is going on in this example that is from a reul on my firewall&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="service.PNG" style="width: 297px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8922i601B296C1152DA89/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="service.PNG" alt="service.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 18:31:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153909#M50752</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-04-24T18:31:42Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153913#M50754</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Under the applications tab under objects every application will list the 'standard' ports that the application will utilize. In the case of web-browsing then yes the only port allowed is tcp/80; SSL only lists tcp/443; SMTP will list tcp/25,587.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The application and port/service settings are not really 'interchangable', yes SMTP will function fine if I open tcp-25 but then anything else could also potentially use tcp-25.&lt;/P&gt;&lt;P&gt;A better example would be something like a large SQLenvironment where I have a large amount of non-standard ports open for the different database connections; in this case I will specify the application as mssql-db/mon depending on the connection and then specify a custom service for &amp;nbsp;something like tcp-64280 or tcp-63180. Obviously I don't want every single application that &lt;STRONG&gt;could&lt;/STRONG&gt; use these ports to actually be allowed, so as long as I have &lt;SPAN class="mce-spellchecker-word"&gt;mssql&lt;/SPAN&gt; specified I can rest &lt;SPAN class="mce-spellchecker-word"&gt;realatively&lt;/SPAN&gt; easy knowing that only the &lt;SPAN class="mce-spellchecker-word"&gt;sql&lt;/SPAN&gt; connections will actually be allowed. If you simply allow the service and specify 'application any' then you are missing the vast majority of the advantages that come with a Palo Alto firwall.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 18:40:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153913#M50754</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-04-24T18:40:25Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153914#M50755</link>
      <description>&lt;P&gt;If you go to Objects &amp;gt; Services you can see that service-http includes ports 80 and 8080 by default and service-https includes port 443 by default.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With this rule you allow any application to run over those ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you check Objects &amp;gt; Applications and search for 80 it shows 1435 and 443 it shows 1137 applications that Palo identifies and that uses this specific port.&lt;/P&gt;&lt;P&gt;All of them are allowed.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 18:43:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153914#M50755</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-04-24T18:43:16Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153915#M50756</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'll generally have this rule included from my Trust to Untrust zones with an application deny rule in front of it. Any application that I specifically don't want to be allowed outside of my network will simply be placed in a deny rule above on that looks like this; as long as the traffic doesn't match the deny rule then it simply gets allowed through the network.&lt;/P&gt;&lt;P&gt;It's a simple way to allow anything but specifically denied traffic to the outside. Now if this wasn't from my trust to my untrust zones and this was allowing traffic to access devices located in my trust or dmz zones then it would be an issue.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 18:45:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153915#M50756</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-04-24T18:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153916#M50757</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You're either just really quick today or I need to stop trying to drink this coffee while replying to posts &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 18:46:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153916#M50757</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-04-24T18:46:31Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153919#M50759</link>
      <description>&lt;P&gt;So in the example I sent you, that rule is allowing every application that can use http and https not just web browsing and ssl. I did not create this rule so I guess I need to figure out why they chose to do http and https instead of the web-browsing and ssl applications&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 18:50:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153919#M50759</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-04-24T18:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153920#M50760</link>
      <description>&lt;P&gt;Great information of all of you even though Raido seems to be posting faster than Bpry LOL&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 18:52:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153920#M50760</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-04-24T18:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153921#M50761</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If you build out the same rule but specify the applicaiton field as [ ssl web-browsing ] then any application that gets identified further would be denied, which is generally why someone would put in this type of rule.&lt;/P&gt;&lt;P&gt;For example even when you have ssl-decryption disabled applications such as twitter-base, pinterest-base, facebook-base, google-base, and all of that are going to be denied. Once the firewall identifies the application then you would need to have a rule that either specifies the service/port that the application is using with 'any' app allowed or you would need to include said application in a security policy that actually allows the traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 18:57:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153921#M50761</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-04-24T18:57:15Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153922#M50762</link>
      <description>&lt;P&gt;BPry I could try to identify the applications,through the ACC, and create another rule above the rule with the any -applications and services http,https and see if I can create a stricter rule and the eliminate the less strict rule&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 19:00:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153922#M50762</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-04-24T19:00:51Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153923#M50763</link>
      <description>&lt;P&gt;Forget http and https.&lt;/P&gt;&lt;P&gt;This has nothing to do with application but it is just how default built-in service object is called in firewall.&lt;/P&gt;&lt;P&gt;And Service is just port - nothing to do with Layer 7 application.&lt;/P&gt;&lt;P&gt;So if you permit Service called service-http then you permit tcp/80 and tcp/8080 and if you permit Service called service-https then you permit tcp/443.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 19:05:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153923#M50763</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-04-24T19:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153925#M50765</link>
      <description>&lt;P&gt;so create a similar rule with out the services and only add the applications that it is using as seen in the ACC&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 19:14:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153925#M50765</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2017-04-24T19:14:09Z</dc:date>
    </item>
    <item>
      <title>Re: Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153927#M50766</link>
      <description>&lt;P&gt;So lets assume you have only 1 security policy that permits only web-browsing application and Service is application-default.&lt;/P&gt;&lt;P&gt;This permits web-browsing on tcp 80.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You open web browser and try to browse web.&lt;BR /&gt;Client computer will send TCP SYN.&lt;BR /&gt;Firewall will check if this SYN goes on port 80 (that is only port that traffic is permitted out). If not then it is blocked and application is logged as not-applicable (firewall never got to application identification as it is already dropped by not using correct port).&lt;BR /&gt;If SYN came on port 80 then it is permitted through.&lt;BR /&gt;Server will reply with SYN ACK.&lt;BR /&gt;Client will send ACK and complete TCP 3way handshake.&lt;BR /&gt;Client will then send HTTP GET (but we don't trust client to identify application).&lt;BR /&gt;Server will send back website. Palo will identify if traffic is web-browsing based on what comes back. So in case of HTTP first 4 packet go through firewall without actually knowing application and just relying on Service tcp/80.&lt;BR /&gt;If after that firewall identifies it is not web-browsing then session is blocked and application that firewall identified is marked in session log.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can create top rule to allow web-browsing and Service application-default.&lt;/P&gt;&lt;P&gt;And below that fallback rule to allow any application with Service service-http (or create your custom tcp-80 service).&lt;BR /&gt;And then you can run report to see what traffic matched against second rule.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 19:25:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/services/m-p/153927#M50766</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-04-24T19:25:59Z</dc:date>
    </item>
  </channel>
</rss>

