<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Risky ports in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/risky-ports/m-p/216256#M62652</link>
    <description>&lt;P&gt;in the new age of Next Generation firewalls, ports do not matter as much as they used to&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;today a lot more protocols and applications use port 80 and 443 where older, more traditional, protocols would use their own port&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;App-ID will assist tremendously in identifying exactly what is traversing the firewall, versus simply monitoring the ports&lt;/P&gt;
&lt;P&gt;each application comes with "application default" ports which will also help to close off 'unusual' ports&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So if you create, for example, a rule that allows web-browsing, ssl and DNS and set the service ports to 'application default', only ports 80,443 and 53 will be 'open' for this rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;'threat' wise, ports 80 and 443 pose far more risks than any other ports combined, so leveraging App-ID with content scanning and threat protection would be a more secure route than relying on just ports&lt;/P&gt;</description>
    <pubDate>Fri, 01 Jun 2018 12:18:10 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2018-06-01T12:18:10Z</dc:date>
    <item>
      <title>Risky ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/risky-ports/m-p/216244#M62649</link>
      <description>&lt;P&gt;What are the risky ports we should not allow from user zone (internal network) to external network (internet / external network)? Like we don't&amp;nbsp;allow 21/23 etc, please suggest other ports too.....&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jun 2018 10:44:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/risky-ports/m-p/216244#M62649</guid>
      <dc:creator>SumitB</dc:creator>
      <dc:date>2018-06-01T10:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: Risky ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/risky-ports/m-p/216252#M62650</link>
      <description>&lt;P&gt;Go the other way, only allow 80, 443 and maybe few others on explicit requests. And implement app policy.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jun 2018 11:09:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/risky-ports/m-p/216252#M62650</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2018-06-01T11:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: Risky ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/risky-ports/m-p/216253#M62651</link>
      <description>&lt;P&gt;I think 80 is also should not be allowed, we used to allow http/https app id instead of ports but what are the most critical ports we should allow anyhow like 21/23.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jun 2018 11:13:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/risky-ports/m-p/216253#M62651</guid>
      <dc:creator>SumitB</dc:creator>
      <dc:date>2018-06-01T11:13:35Z</dc:date>
    </item>
    <item>
      <title>Re: Risky ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/risky-ports/m-p/216256#M62652</link>
      <description>&lt;P&gt;in the new age of Next Generation firewalls, ports do not matter as much as they used to&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;today a lot more protocols and applications use port 80 and 443 where older, more traditional, protocols would use their own port&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;App-ID will assist tremendously in identifying exactly what is traversing the firewall, versus simply monitoring the ports&lt;/P&gt;
&lt;P&gt;each application comes with "application default" ports which will also help to close off 'unusual' ports&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So if you create, for example, a rule that allows web-browsing, ssl and DNS and set the service ports to 'application default', only ports 80,443 and 53 will be 'open' for this rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;'threat' wise, ports 80 and 443 pose far more risks than any other ports combined, so leveraging App-ID with content scanning and threat protection would be a more secure route than relying on just ports&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jun 2018 12:18:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/risky-ports/m-p/216256#M62652</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-06-01T12:18:10Z</dc:date>
    </item>
  </channel>
</rss>

