<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: working process behind  policy with multiple depended applications in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/working-process-behind-policy-with-multiple-depended/m-p/218799#M63227</link>
    <description>&lt;P&gt;If you have 3 apps and 3 ports, then any of the apps can match any of the listed services.&lt;/P&gt;&lt;P&gt;App A could be communicating on port 1, 2 or 3. Same for app B and app C.&lt;/P&gt;&lt;P&gt;When grouping multiple items in a policy element, it's an OR statement. The traffic must match application A OR B OR C and it must match service 1 OR 2 OR 3. So A + 3 or B +1 are both valid matches.&lt;/P&gt;&lt;P&gt;If you need to restrict App A to a single port, you'll need to use a unique security policy rule.&lt;/P&gt;</description>
    <pubDate>Fri, 22 Jun 2018 05:27:14 GMT</pubDate>
    <dc:creator>rmfalconer</dc:creator>
    <dc:date>2018-06-22T05:27:14Z</dc:date>
    <item>
      <title>working process behind  policy with multiple depended applications</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/working-process-behind-policy-with-multiple-depended/m-p/218787#M63225</link>
      <description>&lt;P&gt;I was little ambigous on how Palo alto processes a policy. let say i have a policy with 3 applications(a,b,c) in application field and multiple service ports(1,2,3) is there a chance that one of the application(a or b or c) specified in my application field is also being allowed on ports other than what it meant be allowed (say A must be allowed on port 1,but it is also communicating via 2 or 3).&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jun 2018 01:01:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/working-process-behind-policy-with-multiple-depended/m-p/218787#M63225</guid>
      <dc:creator>SandeepChinta</dc:creator>
      <dc:date>2018-06-22T01:01:14Z</dc:date>
    </item>
    <item>
      <title>Re: working process behind  policy with multiple depended applications</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/working-process-behind-policy-with-multiple-depended/m-p/218799#M63227</link>
      <description>&lt;P&gt;If you have 3 apps and 3 ports, then any of the apps can match any of the listed services.&lt;/P&gt;&lt;P&gt;App A could be communicating on port 1, 2 or 3. Same for app B and app C.&lt;/P&gt;&lt;P&gt;When grouping multiple items in a policy element, it's an OR statement. The traffic must match application A OR B OR C and it must match service 1 OR 2 OR 3. So A + 3 or B +1 are both valid matches.&lt;/P&gt;&lt;P&gt;If you need to restrict App A to a single port, you'll need to use a unique security policy rule.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jun 2018 05:27:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/working-process-behind-policy-with-multiple-depended/m-p/218799#M63227</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2018-06-22T05:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: working process behind  policy with multiple depended applications</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/working-process-behind-policy-with-multiple-depended/m-p/218813#M63229</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/55733"&gt;@rmfalconer&lt;/a&gt;s statement is correct regarding the 'OR' property of any object added to the same field in a secureity policy (app A or B or C)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you enable 'application-default' in the services, instead of using singular service objects, all applications used in security policy will only be matched against their own default ports (visible in the application properties) while other apps will not be allowed to re-use those ports unless they are listed in their own properties&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;as an example look at rule A and B below. they are identical except for the services:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rule B will allow facebook, ssl and web-browsing on tcp 22 and ssh on tcp 80 and 443&lt;/P&gt;
&lt;P&gt;Rule A will allow ssh on tcp 22, but &lt;EM&gt;not&lt;/EM&gt; tcp 80 or 443, web browsing (cleartext http) on tcp 80 but &lt;EM&gt;not&lt;/EM&gt; 443 or 22, ssl on port 443, but not 22 or 80&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="example services.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/15569i1F82B1917A04C867/image-size/large?v=v2&amp;amp;px=999" role="button" title="example services.png" alt="example services.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so you will not need to create a single rule per application, you only need to use application-default to prevent applications re-using other applications' ports&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jun 2018 08:24:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/working-process-behind-policy-with-multiple-depended/m-p/218813#M63229</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-06-22T08:24:58Z</dc:date>
    </item>
  </channel>
</rss>

