<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet Flow Sequence and Application Override in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/packet-flow-sequence-and-application-override/m-p/246024#M70087</link>
    <description>&lt;P&gt;The graph is a bit confusing, so that's where the issue is. App override traffic does indeed skip content inspection unless you're overriding it to a pre-defined app.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note that the diagram you referenced has "Content inspection setup" on the green Application Identification section, not actual content inspection. The "setup" is to do the tasks it lists:&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;- Setup SP3 if security profile is specified&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;- set session to discard if security rule action deny&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;- set QoS class from QoS policy lookup&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;It still has to do those things, even for app overridden traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you follow that box down to the next one ("Application is SSL and decryption policy match?"), the result is No, which moves us back to the pink/salmon FW Fastpath block.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There, it has another yes/no box "Content inspection applicable?". When you do app override, the answer to that is No, which skips all of the SP3/CTD (blue) box and moves to packet forwarding at the bottom.&lt;/P&gt;</description>
    <pubDate>Tue, 15 Jan 2019 02:08:47 GMT</pubDate>
    <dc:creator>gwesson</dc:creator>
    <dc:date>2019-01-15T02:08:47Z</dc:date>
    <item>
      <title>Packet Flow Sequence and Application Override</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-flow-sequence-and-application-override/m-p/245982#M70083</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I have a question regarding the "AppID override" ,&lt;/P&gt;&lt;P&gt;In this article "&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVLCA0" target="_blank" rel="nofollow noopener noreferrer"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVLCA0&lt;/A&gt;" we can read the following:&lt;/P&gt;&lt;P&gt;"&lt;BR /&gt;Special Note about Content and Threat inspection&lt;BR /&gt;Application Override to a custom application will force the firewall to bypass Content and Threat inspection for the traffic that is matching the override rule. The exception to this is when you override to a pre-defined application that supports threat inspection.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;"&lt;/P&gt;&lt;P&gt;However, in the PaloAlto Packet Flow Sequence (available :&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309" target="_blank"&gt;http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309&lt;/A&gt;) we can see this :&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;When the application override policy is matched the only step skiped is [Pattern-based application identification]. The "Content Inspection (SP3/CTD)" is allways performed, regardless of the application override. So the Content profiles seem to be applyed.&lt;/P&gt;&lt;P&gt;So my question is the following: is something missing from the diagram or am I wrongly reading the graph ?&lt;/P&gt;&lt;P&gt;Many thanks,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;Karim BENYELLOUL&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jan 2019 21:20:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-flow-sequence-and-application-override/m-p/245982#M70083</guid>
      <dc:creator>Karim.Benyelloul</dc:creator>
      <dc:date>2019-01-14T21:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Flow Sequence and Application Override</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-flow-sequence-and-application-override/m-p/246024#M70087</link>
      <description>&lt;P&gt;The graph is a bit confusing, so that's where the issue is. App override traffic does indeed skip content inspection unless you're overriding it to a pre-defined app.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note that the diagram you referenced has "Content inspection setup" on the green Application Identification section, not actual content inspection. The "setup" is to do the tasks it lists:&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;- Setup SP3 if security profile is specified&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;- set session to discard if security rule action deny&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;- set QoS class from QoS policy lookup&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;It still has to do those things, even for app overridden traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you follow that box down to the next one ("Application is SSL and decryption policy match?"), the result is No, which moves us back to the pink/salmon FW Fastpath block.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There, it has another yes/no box "Content inspection applicable?". When you do app override, the answer to that is No, which skips all of the SP3/CTD (blue) box and moves to packet forwarding at the bottom.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jan 2019 02:08:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-flow-sequence-and-application-override/m-p/246024#M70087</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-01-15T02:08:47Z</dc:date>
    </item>
  </channel>
</rss>

