<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic App-id Matching Process in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-matching-process/m-p/288427#M76838</link>
    <description>&lt;P&gt;I'm running PA-VM and created with one active rule:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;STRONG&gt;From&lt;/STRONG&gt;: Inside&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;STRONG&gt;To&lt;/STRONG&gt;: Outside&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;STRONG&gt;Application&lt;/STRONG&gt;: Web Basic Application group (&lt;EM&gt;ssl,dns,web-browsing,ping&lt;/EM&gt;)&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;STRONG&gt;Service&lt;/STRONG&gt;: application-default&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;STRONG&gt;Action&lt;/STRONG&gt;: Allow&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SSL Decryption is disabled&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PA-Rules.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21441i2B495012D56EAE3A/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="PA-Rules.png" alt="PA-Rules.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm facing issues browsing to websites with preconfigured App-ids:&lt;/P&gt;&lt;P&gt;Not working:&lt;/P&gt;&lt;P&gt;linkedin/soundcloud/batte.net/docs.google.com(any other website specified app-id)&lt;/P&gt;&lt;P&gt;Working:&lt;/P&gt;&lt;P&gt;youtube/google(search-engine)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm running PA that doesn't have the google-base yet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;STRONG&gt;"During the SSL encrypted session, the firewall receives server "hello packets", which has the certificate details or the server can send a separate certificate packet. The firewall looks for the X.509 digital certificate received from the server and inspects the common name field in the SSL Handshake Protocol."&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVSCA0" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVSCA0&lt;/A&gt;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;1.)&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;I ran it in the Lab, and the results were different:&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;PC ---&amp;gt; TLS Client Hello(server-name=&lt;A href="http://www.linked.com/" target="_blank" rel="noopener"&gt;www.linked.com&lt;/A&gt;) ---&amp;gt; FW ---&amp;gt; Linkedin (Sent)&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Linkedin ---&amp;gt; TLS Server Hello -- FW ----&amp;gt; DROPPED&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Application is listed as&lt;STRONG&gt; linkedin-base&lt;/STRONG&gt; with action &lt;STRONG&gt;Discard&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Certificate from Linkedin is not sent until Linkedin recevices ACK on the TLS Server Hello.&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Which i tested on a pc with direct internet access, this&amp;nbsp;contradicts the post from Palo Alto Knowledge Base&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="linkedin-server-certificate.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21442i3C87494F540E5C77/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="linkedin-server-certificate.png" alt="linkedin-server-certificate.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;2.)&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;I tested HTTP &amp;amp; HTTPS to battle.net&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Note:&amp;nbsp;&lt;A href="http://battle.net/" target="_blank" rel="noopener"&gt;battle.net&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;is redirect to&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://blizzard.com/" target="_blank" rel="noopener"&gt;blizzard.com&lt;/A&gt;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;With HTTP:&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;- Dropped and classifed as battle.net in traffic monitor&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;- HTTP GET is dropped on the firewall side&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;- Classified as battle.net App-id&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;With HTTPS:&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;- Works succesfully and redirected&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;- Comman Name in the Certificate provided in Server Certificate is &lt;A href="http://www.battle.net" target="_blank" rel="noopener"&gt;www.battle.net&lt;/A&gt; - This should be matched by the app-id engine but is listed as an SSL application&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;My question is, does it use certificate to match the app-id and/or HTTP Get?&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;How does the actual matching process work and why doesn't work the same across the board?&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Software: 7.0.1&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Application Version:&amp;nbsp;497-2688&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Thanks guys&lt;/P&gt;</description>
    <pubDate>Fri, 13 Sep 2019 21:31:08 GMT</pubDate>
    <dc:creator>zizo94</dc:creator>
    <dc:date>2019-09-13T21:31:08Z</dc:date>
    <item>
      <title>App-id Matching Process</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-matching-process/m-p/288427#M76838</link>
      <description>&lt;P&gt;I'm running PA-VM and created with one active rule:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;STRONG&gt;From&lt;/STRONG&gt;: Inside&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;STRONG&gt;To&lt;/STRONG&gt;: Outside&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;STRONG&gt;Application&lt;/STRONG&gt;: Web Basic Application group (&lt;EM&gt;ssl,dns,web-browsing,ping&lt;/EM&gt;)&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;STRONG&gt;Service&lt;/STRONG&gt;: application-default&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;STRONG&gt;Action&lt;/STRONG&gt;: Allow&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SSL Decryption is disabled&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PA-Rules.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21441i2B495012D56EAE3A/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="PA-Rules.png" alt="PA-Rules.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm facing issues browsing to websites with preconfigured App-ids:&lt;/P&gt;&lt;P&gt;Not working:&lt;/P&gt;&lt;P&gt;linkedin/soundcloud/batte.net/docs.google.com(any other website specified app-id)&lt;/P&gt;&lt;P&gt;Working:&lt;/P&gt;&lt;P&gt;youtube/google(search-engine)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm running PA that doesn't have the google-base yet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;STRONG&gt;"During the SSL encrypted session, the firewall receives server "hello packets", which has the certificate details or the server can send a separate certificate packet. The firewall looks for the X.509 digital certificate received from the server and inspects the common name field in the SSL Handshake Protocol."&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVSCA0" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVSCA0&lt;/A&gt;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;1.)&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;I ran it in the Lab, and the results were different:&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;PC ---&amp;gt; TLS Client Hello(server-name=&lt;A href="http://www.linked.com/" target="_blank" rel="noopener"&gt;www.linked.com&lt;/A&gt;) ---&amp;gt; FW ---&amp;gt; Linkedin (Sent)&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Linkedin ---&amp;gt; TLS Server Hello -- FW ----&amp;gt; DROPPED&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Application is listed as&lt;STRONG&gt; linkedin-base&lt;/STRONG&gt; with action &lt;STRONG&gt;Discard&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Certificate from Linkedin is not sent until Linkedin recevices ACK on the TLS Server Hello.&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Which i tested on a pc with direct internet access, this&amp;nbsp;contradicts the post from Palo Alto Knowledge Base&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="linkedin-server-certificate.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21442i3C87494F540E5C77/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="linkedin-server-certificate.png" alt="linkedin-server-certificate.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;2.)&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;I tested HTTP &amp;amp; HTTPS to battle.net&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Note:&amp;nbsp;&lt;A href="http://battle.net/" target="_blank" rel="noopener"&gt;battle.net&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;is redirect to&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://blizzard.com/" target="_blank" rel="noopener"&gt;blizzard.com&lt;/A&gt;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;With HTTP:&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;- Dropped and classifed as battle.net in traffic monitor&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;- HTTP GET is dropped on the firewall side&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;- Classified as battle.net App-id&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;With HTTPS:&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;- Works succesfully and redirected&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;- Comman Name in the Certificate provided in Server Certificate is &lt;A href="http://www.battle.net" target="_blank" rel="noopener"&gt;www.battle.net&lt;/A&gt; - This should be matched by the app-id engine but is listed as an SSL application&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;My question is, does it use certificate to match the app-id and/or HTTP Get?&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;How does the actual matching process work and why doesn't work the same across the board?&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Software: 7.0.1&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Application Version:&amp;nbsp;497-2688&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="m_5152872323433595530_1qeIAgB0cPwnLhDF9XSiJM"&gt;Thanks guys&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2019 21:31:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-matching-process/m-p/288427#M76838</guid>
      <dc:creator>zizo94</dc:creator>
      <dc:date>2019-09-13T21:31:08Z</dc:date>
    </item>
    <item>
      <title>Re: App-id Matching Process</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-matching-process/m-p/288452#M76842</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/121963"&gt;@zizo94&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;There are multiple ways that encrypted traffic can still be identified via signatures that don't take into account the CN listed on the certificate. Additionally some app-ids don't take into account the CN of the certificate being exchanged in the handshake at all, and rely strickly on other means.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS,&lt;/P&gt;&lt;P&gt;You are using an extremely outdated, and EOLd, version of PANOS and an extremely outdated content package. The signatures you are using are old enough that I&amp;nbsp;&lt;EM&gt;wouldn't&lt;/EM&gt; expect your traffic to be identifying as the proper app-id anymore with or without decryption.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 14 Sep 2019 01:09:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-matching-process/m-p/288452#M76842</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-09-14T01:09:24Z</dc:date>
    </item>
    <item>
      <title>Re: App-id Matching Process</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-matching-process/m-p/288504#M76852</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I upgraded the PA to version 9.0.1.&lt;/P&gt;&lt;P&gt;Now I can the see the added app-id for google-base.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Q:1&lt;/P&gt;&lt;P&gt;I'm still having the same issue, traffic is being blocked and not using the default web-browsing application.&lt;/P&gt;&lt;P&gt;It's identifying app-id traffic and being discarded, If I add the google-base into the application's inside the rule, it will work.&lt;/P&gt;&lt;P&gt;Is this normal behaviour from PA?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot from 2019-09-16 09-56-55.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21446i83FD290420ECEF7D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot from 2019-09-16 09-56-55.png" alt="Screenshot from 2019-09-16 09-56-55.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Q2:&lt;/P&gt;&lt;P&gt;As you mentioed there are multiple means of identifying traffic via signatures.&lt;/P&gt;&lt;P&gt;Can you share any documents that can provide me with ways.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2019 06:58:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-matching-process/m-p/288504#M76852</guid>
      <dc:creator>zizo94</dc:creator>
      <dc:date>2019-09-16T06:58:05Z</dc:date>
    </item>
  </channel>
</rss>

