<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firewall rules  - strange suggesttion in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222057#M63883</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I gave a rule that allows snmp-trap messages to my SNMPD server.&amp;nbsp; for some reason PA complains that SNMP-TRAP needs SNMP-BASE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now if I add in SNMP-BASE this is going to open up port 161 where as trap uses 162.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So why do i need SNMP-BASE&lt;/P&gt;</description>
    <pubDate>Thu, 12 Jul 2018 23:45:43 GMT</pubDate>
    <dc:creator>Alex_Samad</dc:creator>
    <dc:date>2018-07-12T23:45:43Z</dc:date>
    <item>
      <title>Firewall rules  - strange suggesttion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222057#M63883</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I gave a rule that allows snmp-trap messages to my SNMPD server.&amp;nbsp; for some reason PA complains that SNMP-TRAP needs SNMP-BASE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now if I add in SNMP-BASE this is going to open up port 161 where as trap uses 162.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So why do i need SNMP-BASE&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jul 2018 23:45:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222057#M63883</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2018-07-12T23:45:43Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rules  - strange suggesttion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222322#M63941</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;So why do i need SNMP-BASE&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;... because of rare cases where paloalto isn't able to identify the snmp-trap right away. (Even if I don't really know in what situation this could be possible as snmp-traps mostly are one-packet connections. There aren't a lot of possibilities other than identify the application in just this one packet)&lt;/P&gt;&lt;P&gt;Anyway, if it works just with snmp-trap, then one possibility is to ignore the commit-warning or what I also did in this case, allow also snmp-base and manually add service 162/udp instead of application default.&lt;/P&gt;&lt;P&gt;There is also a feature request out there for a feature to suppress these commit warnings ...&lt;/P&gt;</description>
      <pubDate>Sun, 15 Jul 2018 07:55:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222322#M63941</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-07-15T07:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rules  - strange suggesttion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222336#M63949</link>
      <description>&lt;P&gt;thanks, think I will live with the warning seems counter intuitive to add snmp and then limit to 161.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have the feature request number ?&lt;/P&gt;</description>
      <pubDate>Sun, 15 Jul 2018 21:48:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222336#M63949</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2018-07-15T21:48:28Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rules  - strange suggesttion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222368#M63954</link>
      <description>&lt;PRE&gt;think I will live with the warning seems counter intuitive to add snmp &lt;BR /&gt;and then limit to 161. &lt;/PRE&gt;&lt;P&gt;Yes, it does take some getting used to.&amp;nbsp; Remember that with PAN the point of basic policy is to FORGET about port and protocol just select the application you want.&amp;nbsp; And PAN will detect that application EVEN IF it runs on different ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thus if you know the app you are writting the rule for will always be on the standard port then you use this option to prevent that default behavior.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jul 2018 10:08:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222368#M63954</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2018-07-16T10:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rules  - strange suggesttion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222369#M63955</link>
      <description>&lt;P&gt;Seems counter intuitive to allow something I didn't want to allow just to stop a warning.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently the traps are getting through so .&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jul 2018 10:08:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222369#M63955</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2018-07-16T10:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rules  - strange suggesttion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222407#M63961</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;While you are opening another application, remmeber that it is just that, the application and not a port. Meaning that the firewall needs to identify the application and it wont just open that port for all traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jul 2018 15:27:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222407#M63961</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-07-16T15:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rules  - strange suggesttion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222419#M63963</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The warning is more to do with how other applications function more so than this particular app-id. The only reason the warning is generated is because the app-id has 'snmp-base' as a dependent (ie: if you look at snmp-trap it states 'Depends on: snmp-base'.&amp;nbsp;&lt;/P&gt;&lt;P&gt;While it can be argued that snmp-trap really doesn't require that snmp-base actually be allowed, and therefore snmp-trap really shouldn't have a dependency to snmp-base, it's more so that applications such as 'dropbox-downloading' depends on 'dropbox-base' and 'ssl' aren't effected and causes admins to leave out required applications.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is one of the weird things where PA could likely add an option to 'Ignore Commit Warnings' or something similar to the app-id, or further properly identify that snmp-trap doesn't actually require snmp-base, but this simply hasn't been created yet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would do what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;mentioned and simply add the app-id and specify that the service can only be 162/udp. This clears up the commit warning and won't actually allow snmp-base traffic unless it happens to be identified on 162. Or just ignore it, you just run the risk of missing an important warning when that list starts to grow over time.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jul 2018 18:03:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-rules-strange-suggesttion/m-p/222419#M63963</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-07-16T18:03:26Z</dc:date>
    </item>
  </channel>
</rss>

