<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Rule Scenario 80/443 vs using ssl/web-browsing in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/rule-scenario-80-443-vs-using-ssl-web-browsing/m-p/173987#M54722</link>
    <description>&lt;P&gt;"web-browsing" and "ssl" only match generic HTTP/HTTPS traffic. &amp;nbsp;If the firewall determines a more precise App-ID for the traffic, then it will switch to using that for determining whether to allow/deny the traffic, which may fail in mysterious ways. &amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, if you have a general "allow web traffic" Security Policy and use "web-browsing" in the rule, then very basic web traffic will be allowed. &amp;nbsp;But, if someone accesses GMail, or Facebook, or Youtube, or click on a video link in a generic web page, than the firewall will notice and match that traffic to the google-base, or google-mail, or facebook-base, or youtube, or streaming-video App-ID, none of which are listed in the rule, and block the traffic. &amp;nbsp;Which leads you down a rabit hole of "access website, check logs for what app is shown, update rule, keep browsing, rinse and repeat". &amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We ran into this issue trying to get regular ol'Moodle courses working correctly using application matching. &amp;nbsp;Once the list got beyond 6 or 7 difference applications, we switched to just allowing straight port 80/443 traffic through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are situations where the application matching really helps (video conferencing, for example), and situations where it really doesn't (a general "allow web traffic" rule). &amp;nbsp;It depends on how specific you need the rule to be.&lt;/P&gt;</description>
    <pubDate>Wed, 30 Aug 2017 20:58:37 GMT</pubDate>
    <dc:creator>fjwcash</dc:creator>
    <dc:date>2017-08-30T20:58:37Z</dc:date>
    <item>
      <title>Rule Scenario 80/443 vs using ssl/web-browsing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rule-scenario-80-443-vs-using-ssl-web-browsing/m-p/173939#M54704</link>
      <description>&lt;P&gt;HI in what Rule Scenario&amp;nbsp; woulld 80/443 vs using ssl/web-browsing be used. And why wouldnt app for ssl and web-browsing not work but prot 80/443 work&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 18:14:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rule-scenario-80-443-vs-using-ssl-web-browsing/m-p/173939#M54704</guid>
      <dc:creator>clyde.franklin</dc:creator>
      <dc:date>2017-08-30T18:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: Rule Scenario 80/443 vs using ssl/web-browsing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rule-scenario-80-443-vs-using-ssl-web-browsing/m-p/173987#M54722</link>
      <description>&lt;P&gt;"web-browsing" and "ssl" only match generic HTTP/HTTPS traffic. &amp;nbsp;If the firewall determines a more precise App-ID for the traffic, then it will switch to using that for determining whether to allow/deny the traffic, which may fail in mysterious ways. &amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, if you have a general "allow web traffic" Security Policy and use "web-browsing" in the rule, then very basic web traffic will be allowed. &amp;nbsp;But, if someone accesses GMail, or Facebook, or Youtube, or click on a video link in a generic web page, than the firewall will notice and match that traffic to the google-base, or google-mail, or facebook-base, or youtube, or streaming-video App-ID, none of which are listed in the rule, and block the traffic. &amp;nbsp;Which leads you down a rabit hole of "access website, check logs for what app is shown, update rule, keep browsing, rinse and repeat". &amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We ran into this issue trying to get regular ol'Moodle courses working correctly using application matching. &amp;nbsp;Once the list got beyond 6 or 7 difference applications, we switched to just allowing straight port 80/443 traffic through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are situations where the application matching really helps (video conferencing, for example), and situations where it really doesn't (a general "allow web traffic" rule). &amp;nbsp;It depends on how specific you need the rule to be.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 20:58:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rule-scenario-80-443-vs-using-ssl-web-browsing/m-p/173987#M54722</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2017-08-30T20:58:37Z</dc:date>
    </item>
    <item>
      <title>Re: Rule Scenario 80/443 vs using ssl/web-browsing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rule-scenario-80-443-vs-using-ssl-web-browsing/m-p/174342#M54785</link>
      <description>&lt;P&gt;Instead of opening port 80/443 create application filter to dynamically group applications together and add filter into the &amp;nbsp;rule.&lt;/P&gt;&lt;P&gt;Objects &amp;gt; Application Filters&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A title="https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/app-id/create-an-application-filter" href="https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/app-id/create-an-application-filter" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/app-id/create-an-application-filter&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 13:15:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rule-scenario-80-443-vs-using-ssl-web-browsing/m-p/174342#M54785</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-09-01T13:15:12Z</dc:date>
    </item>
  </channel>
</rss>

