<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynamic TCP port APP query in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-tcp-port-app-query/m-p/230005#M66127</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/57857"&gt;@ash83&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;SPAN class=""&gt;What could be done if the app in use in enhanced-file-transfer?&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Sorry, this one I don't understand. What do you want to do?&lt;/P&gt;</description>
    <pubDate>Fri, 07 Sep 2018 16:11:09 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-09-07T16:11:09Z</dc:date>
    <item>
      <title>Dynamic TCP port APP query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-tcp-port-app-query/m-p/229768#M66061</link>
      <description>&lt;P&gt;Hi community, In a situation where there is a security policy allowing: SOURCE Source IP: any Source Zone: outside DESTINATION Destination IP: public IP 1.2.3.4 -&amp;gt; NAT'd to private IP 10.10.10.10 (servername1) (the security policy is using the post NAT zone). The inbound NAT is also correctly configured, and NATing correctly. APP: appX -&amp;gt; any APP which uses tcp/dynamic ACTION allow The service provided by servername1 has to be available to the world, and it is serving APP=appX content (using dynamic tcp ports) The above scenario will efectively allow any IP to access 1.2.3.4 -&amp;gt; 10.10.10.10 (servername1) using APP=appX on ANY tcp port. Restricting the source IPs to some IPs, or country, continent etc is not an option, as it is a service that needs to be available to anyone on the internet. Is it not using appX -&amp;gt; any APP which uses tcp/dynamic a huge security risk, as a it is allowing connection on any tcp port, and this will end up taking down 10.10.10.10 (servername1) after it cannot handle any more connections? The only solution I can think off is to stop using appX in the above scenario, and try to use service (L4 instead) - which is not really a Palo Alto friendly approach. Any idea(s) would be much appreciated. Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 16:24:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dynamic-tcp-port-app-query/m-p/229768#M66061</guid>
      <dc:creator>ash83</dc:creator>
      <dc:date>2018-09-06T16:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic TCP port APP query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-tcp-port-app-query/m-p/229791#M66064</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/57857"&gt;@ash83&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the security policy you could specify a service in addition to the app. This way you can restrict the detection of the app to the port(s) you specify.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Sep 2018 19:13:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dynamic-tcp-port-app-query/m-p/229791#M66064</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-06T19:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic TCP port APP query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-tcp-port-app-query/m-p/229995#M66124</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;Hi&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592" target="_self"&gt;vsys_remo&lt;/A&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;What could be done if the app in use in enhanced-file-transfer?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Sep 2018 14:51:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dynamic-tcp-port-app-query/m-p/229995#M66124</guid>
      <dc:creator>ash83</dc:creator>
      <dc:date>2018-09-07T14:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic TCP port APP query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dynamic-tcp-port-app-query/m-p/230005#M66127</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/57857"&gt;@ash83&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;SPAN class=""&gt;What could be done if the app in use in enhanced-file-transfer?&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Sorry, this one I don't understand. What do you want to do?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Sep 2018 16:11:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dynamic-tcp-port-app-query/m-p/230005#M66127</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-07T16:11:09Z</dc:date>
    </item>
  </channel>
</rss>

