<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: App-id tcp/993 having issues in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172722#M54462</link>
    <description>&lt;P&gt;Application-default won't work here. You can see from your previous screenshots that the connection starts as SSL. The default port for SSL is 443. Since the connection starts as SSL, your "Known OK" application list including SSL will break.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's why you see your&amp;nbsp;&lt;STRONG&gt;start&lt;/STRONG&gt; log showing SSL but the&amp;nbsp;&lt;STRONG&gt;end&lt;/STRONG&gt; log is incomplete.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You'll need to remove the "application-default" from your rule. If you really want the application-default for the rest of the traffic, you'll need to split the rule, add one with "ssl" as the application and port (service) 993 as allowed.&lt;/P&gt;</description>
    <pubDate>Tue, 22 Aug 2017 22:02:11 GMT</pubDate>
    <dc:creator>gwesson</dc:creator>
    <dc:date>2017-08-22T22:02:11Z</dc:date>
    <item>
      <title>App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172473#M54414</link>
      <description>&lt;P&gt;New install of dual&amp;nbsp;PAN 3020s on 8.0.2 &amp;nbsp;that went really well for the most part and the only issue I am having now is imap(s) and&amp;nbsp;Linux clients w/office 365 not working right.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;I have a 'known ok' rule with outlook-web-online (among other allowed apps -- ssl included) using app-default but I get tcp-resets from the far end and users are not able to get mail via imaps on Linux clients ( I can on windows using latest TB).&lt;/LI&gt;&lt;LI&gt;I added a specific rule for tcp/993 with 'any' for app-default and it still doesn't work.&lt;/LI&gt;&lt;LI&gt;The only way I can get it to work is a blanket ANY/ANY with specific source IPs, no specific app-ids and using application default. &amp;nbsp;If I specify outlook-web-online and SSL I don't see the traffic even hit the PAN and clients complain about not being able to get email. &amp;nbsp;Without those app-ids I see the traffic and everyone is happy as a clam.&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Not doing SSL decryption. Has anyone seen this behavior before? &amp;nbsp;It seems to be local to some Linux users and the only thing I can think of is maybe outdated version of SSL/TSL on their local systems? &amp;nbsp;PAN not doing much to help me at all with this either as the logs are either there when its working or pretty much nothing when its not. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2017 22:46:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172473#M54414</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-21T22:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172500#M54416</link>
      <description>&lt;P&gt;Hey&lt;/P&gt;&lt;P&gt;Change policy to any/any so that traffis would work.&lt;/P&gt;&lt;P&gt;Go to traffic log and click on mag glass of this session and paste screenshot of session details.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 01:25:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172500#M54416</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-08-22T01:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172503#M54418</link>
      <description>&lt;P&gt;I had the rule set to any/any and it was working, but when trying to get it working right I&amp;nbsp;changed it to app-id and it broke again. &amp;nbsp;I changed it back to any/any but don't see any packets coming across on port 993 and this rule. Screenshot below is when it was set to any/app-default and was working. &amp;nbsp;It is now set to any/any but I don't see any packets on port 993 hitting the PAN from any of the 3 source IPs I have defined to log it. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="working-pa-any-any.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10865i5B55FA4396CF0DB0/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="working-pa-any-any.JPG" alt="working-pa-any-any.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;test security-policy-match application outlook-web-online source 10.x.x.x destination 40.97.134.18 destination-port 993 protocol 6

"outbound-imaps; index: 14" {
        from trust;
        source [ 10.x.x.x 10.y.y.y 10.z.z.z ];
        source-region none;
        to untrust;
        destination any;
        destination-region none;
        user any;
        category any;
        application/service  any/any/any/any;
        action allow;
        icmp-unreachable: no
        terminal yes;
}&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 02:24:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172503#M54418</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-22T02:24:27Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172651#M54448</link>
      <description>&lt;P&gt;Ok, so the rule is currently any/any, locked down to the 3 users source IPs and its working. &amp;nbsp;I can't leave it like this so I need to figure what is going on. &amp;nbsp; Screenshot below is from today with everything working like it should. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pan-any-any-today.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10875i4A57AE560540E7F5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="pan-any-any-today.JPG" alt="pan-any-any-today.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 16:06:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172651#M54448</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-22T16:06:06Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172655#M54449</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34542"&gt;@drewdown&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;In both examples your destination port is 993 so I'm not really seeing the issue. It's highly unlikley that anyone that actually sends an email is going to actually send it&amp;nbsp;&lt;STRONG&gt;from&lt;/STRONG&gt; port 993, it simply goes&amp;nbsp;&lt;STRONG&gt;to&amp;nbsp;&lt;/STRONG&gt;993. If you are attempting to filter this policy by source port that really isn't going to work that well with modern email applications.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 17:20:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172655#M54449</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-08-22T17:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172661#M54450</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34542"&gt;@drewdown&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;In both examples your destination port is 993 so I'm not really seeing the issue. It's highly unlikley that anyone that actually sends an email is going to actually send it&amp;nbsp;&lt;STRONG&gt;from&lt;/STRONG&gt; port 993, it simply goes&amp;nbsp;&lt;STRONG&gt;to&amp;nbsp;&lt;/STRONG&gt;993. If you are attempting to filter this policy by source port that really isn't going to work that well with modern email applications.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Come on man.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They are connecting to o365 via port 993 and the issue is I have to have a rule set to ANY/ANY/ANY to allow Linux IMAPs to establish that connection. &amp;nbsp;So yes that is an issue when I&amp;nbsp;already have a rule allowing those ports (80/443/587/993/995) via app-id, application default to ANY destination which works for everyone else but them. &amp;nbsp;I shouldn't have to have a specific rule locked down to source IPs to get this traffic to pass through the PAN. &amp;nbsp; Especially when the PAN is classifying the traffic as two app-ids (outlook-web-online and SSL) I am already allowing. &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if you don't think thats an issue then we can just agree to disagree. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 21:49:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172661#M54450</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-22T21:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172669#M54453</link>
      <description>&lt;P&gt;You've set service to ANY or application-default? Would you mind sharing a screenshot of the rule where you expect traffic to flow through?&lt;/P&gt;&lt;P&gt;And are there differences in the traffic from the windows clients compared to the screens you already posted?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 18:27:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172669#M54453</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-22T18:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172714#M54460</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;You've set service to ANY or application-default? Would you mind sharing a screenshot of the rule where you expect traffic to flow through?&lt;/P&gt;&lt;P&gt;And are there differences in the traffic from the windows clients compared to the screens you already posted?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes there is and I don't see Windows clients using IMAPs/993 to o365 in the logs. &amp;nbsp;Just a bunch of iphones here and there&amp;nbsp;and all of that traffic gets classified as application &lt;STRONG&gt;unknown&lt;/STRONG&gt;. &amp;nbsp;Whereas the linux clients that I whitelisted all get classified as outlook-web and ssl. &amp;nbsp;Its just weird.&amp;nbsp;&amp;nbsp;&amp;nbsp; Someone on reddit mentioned maybe the way linux handles IMAPs vs Windows but I don't know enough about all that to be sure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule 14 is the any any any and&amp;nbsp;rule 15 includes the IMAPs app-ids I mentioned prior. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pan-policy.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10880i56DA954498A067B5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="pan-policy.JPG" alt="pan-policy.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can see the two rules and what they produce in the logs here:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pa-logs.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10881iB40A99EEA769D9F1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="pa-logs.JPG" alt="pa-logs.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 21:53:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172714#M54460</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-22T21:53:05Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172722#M54462</link>
      <description>&lt;P&gt;Application-default won't work here. You can see from your previous screenshots that the connection starts as SSL. The default port for SSL is 443. Since the connection starts as SSL, your "Known OK" application list including SSL will break.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's why you see your&amp;nbsp;&lt;STRONG&gt;start&lt;/STRONG&gt; log showing SSL but the&amp;nbsp;&lt;STRONG&gt;end&lt;/STRONG&gt; log is incomplete.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You'll need to remove the "application-default" from your rule. If you really want the application-default for the rest of the traffic, you'll need to split the rule, add one with "ssl" as the application and port (service) 993 as allowed.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 22:02:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172722#M54462</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2017-08-22T22:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172727#M54463</link>
      <description>&lt;P&gt;What &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;&amp;nbsp;wrote is exactly the reason of this "issue". So because of the way you configured the rule, it is actually expected behaviour.&lt;/P&gt;&lt;P&gt;But the end reason is more likely because there wasn't enough data for paloalto to identify the application, so the session shows incomplete.&lt;/P&gt;&lt;P&gt;In your case I would add an additional rule (below) your known ok rule for application ssl and service 993/tcp.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 23:30:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172727#M54463</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-22T23:30:39Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172833#M54487</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;Application-default won't work here. You can see from your previous screenshots that the connection starts as SSL. The default port for SSL is 443. Since the connection starts as SSL, your "Known OK" application list including SSL will break.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's why you see your&amp;nbsp;&lt;STRONG&gt;start&lt;/STRONG&gt; log showing SSL but the&amp;nbsp;&lt;STRONG&gt;end&lt;/STRONG&gt; log is incomplete.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You'll need to remove the "application-default" from your rule. If you really want the application-default for the rest of the traffic, you'll need to split the rule, add one with "ssl" as the application and port (service) 993 as allowed.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Like this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pa-new-rule.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10896i5E560416C0754F1C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="pa-new-rule.JPG" alt="pa-new-rule.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;When I did that the logs showed the traffic matching both rules now from a single source machine, &amp;nbsp;But at least no incompletes now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pa-logs-02.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10898iDF2EAFF01A3D2510/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="pa-logs-02.JPG" alt="pa-logs-02.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 13:14:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172833#M54487</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-23T13:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172835#M54488</link>
      <description>&lt;P&gt;Yes &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is again the expected behaviour. The firewall identifies first the general app 'ssl'. But then after a few more packets it sees 'outlook-web-online'. And with this application change the firewall has to reevaluate the policy to check if this app is allowed or not and in your case this app then is allowed in another rule than the initial ssl application.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 13:15:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172835#M54488</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-23T13:15:35Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172837#M54489</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;Yes &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Thanks. &amp;nbsp;Just odd to me becase the PA classifies that traffic as those two app-ids but can't seem to do anything with it. &amp;nbsp;And why below the known-OK rule? &amp;nbsp;It has those app-ids in it so it would break if that rule were below it because it would match the known-OK correct?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I assumed that because both ssl and outlook-web-online were included in the known-OK that the traffic would pass because both are allowed. &amp;nbsp;So even if it starts out as SSL and moves to outlook-web-online then it should be OK. &amp;nbsp;BUt you are saying once it classifies it as SSL it moves down the list of policies to check to see if outlook-web-online is allowed as well?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 13:18:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172837#M54489</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-23T13:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172838#M54490</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34542"&gt;@drewdown&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;Thanks. &amp;nbsp;Just odd to me becase the PA classifies that traffic as those two app-ids but can't seem to do anything with it. &amp;nbsp;What does linux/OSX do differently than Windows and IMAPs?&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;What do you mean with "can't seem to do anything with it"?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't know the difference between the OSes in case of IMAPs but ther hase to be a little one. But in this case it actually isn't imaps that the firewall sees. This would be the case if you decrypt the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here there is probably a little difference in the TLS handshake as this is the only cleartext part which the firewall is able to check to determine the actual application (outlook-web-online).&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 13:26:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172838#M54490</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-23T13:26:18Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172839#M54491</link>
      <description>&lt;P&gt;The "problem" was 'application-default' as service. This really means that the allowed apps are &lt;STRONG&gt;only&lt;/STRONG&gt; allowed on their default ports - and default port for ssl is &lt;STRONG&gt;only&lt;/STRONG&gt; 443/tcp.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The policy check is done at the beginning and when the application changes.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 13:31:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172839#M54491</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-23T13:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172850#M54492</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34542"&gt;@drewdown&lt;/a&gt;&lt;/P&gt;&lt;P&gt;FYI,&lt;/P&gt;&lt;P&gt;If you are not going to be decrypting traffic and plan on simply using an application filter with an application-default rule, you'll be breaking a lot more than simply imap due to the same issue you are running into here.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 14:14:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172850#M54492</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-08-23T14:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172859#M54494</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34542"&gt;@drewdown&lt;/a&gt;&lt;/P&gt;&lt;P&gt;FYI,&lt;/P&gt;&lt;P&gt;If you are not going to be decrypting traffic and plan on simply using an application filter with an application-default rule, you'll be breaking a lot more than simply imap due to the same issue you are running into here.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;The plan was to decrypt but logistics in installing the cert and so forth stopped me from doing it day 1. &amp;nbsp;I plan on doing it just need to figure out the best way. &amp;nbsp;So far the only thing that has broken is this so &amp;nbsp;with fingers crossed will wait and see what if anything else breaks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 15:05:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172859#M54494</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-23T15:05:47Z</dc:date>
    </item>
    <item>
      <title>Re: App-id tcp/993 having issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172913#M54505</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34542"&gt;@drewdown&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;One thing when you do decrypt that you will need to setup is a rule allowing ssl on 80. It's a quirk with decrypting and Palo can't modify the default ports for the app-id without destroying it for anybody not decrypting.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 19:50:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-tcp-993-having-issues/m-p/172913#M54505</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-08-23T19:50:31Z</dc:date>
    </item>
  </channel>
</rss>

