<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: application override VS service in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/application-override-vs-service/m-p/319304#M81896</link>
    <description>&lt;P&gt;the service port let's you determine on which port TCP is allowed to connect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so if you set port 80, tcp is allowed to connect on pot 80, app-id can then determine if the session is web-browsing&amp;nbsp; or ftp os ssh or something else. because you allowed port 80, the session will be allowed through and app-id will simply identify the app&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you use &lt;STRONG&gt;application-default&lt;/STRONG&gt;, app-id will use it's knowledge of the data flow to determine if the port it sees in the tcp session matches what it sees in the payload, so if a tcp session on port 80 comes in, that's fine, but after it sends payload and app-id determines that the session is actually LDAP, it will drop the connection as it is using a non-default port&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in both the above cases, app-id will keep track of the flow and make sure the application is behaving as expected, applying the right heuristics etc to determine if there are any threats or application switches happening&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;application-override tells app-id and content-id (if used with a custom app) to &lt;EM&gt;not inspect a session at all&lt;/EM&gt; and simply label it as the custom app. so if you set app override on port 80, that opens up port 80 to all underlying applications and &lt;EM&gt;threats&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 30 Mar 2020 06:58:57 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2020-03-30T06:58:57Z</dc:date>
    <item>
      <title>application override VS service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override-vs-service/m-p/319053#M81862</link>
      <description>&lt;P&gt;I have new application.&lt;/P&gt;&lt;P&gt;I need to know what is the difference between&amp;nbsp;application override policy and the security policy by using the service port number both are stateful inspection firewall at Layer-4?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Service:&lt;BR /&gt;Allows you to select a Layer 4 (TCP or UDP) port for the application. You can choose any, specify a port, or use application-default to permit use of the standards-based port for the application.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Application Override:&lt;BR /&gt;Identify sessions that you do not want processed by the App-ID engine, which is a Layer-7 inspection. Traffic matching an application override policy forces the firewall to handle the session as a regular stateful inspection firewall at Layer-4.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my reference:&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/policy/policy-types.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/policy/policy-types.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/policy/security-policy/components-of-a-security-policy-rule.html#id5ac93939-77c9-4981-af21-965414779af3_service" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/policy/security-policy/components-of-a-security-policy-rule.html#id5ac93939-77c9-4981-af21-965414779af3_service&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2020 16:24:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override-vs-service/m-p/319053#M81862</guid>
      <dc:creator>HasanAljohi</dc:creator>
      <dc:date>2020-03-27T16:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: application override VS service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override-vs-service/m-p/319304#M81896</link>
      <description>&lt;P&gt;the service port let's you determine on which port TCP is allowed to connect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so if you set port 80, tcp is allowed to connect on pot 80, app-id can then determine if the session is web-browsing&amp;nbsp; or ftp os ssh or something else. because you allowed port 80, the session will be allowed through and app-id will simply identify the app&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you use &lt;STRONG&gt;application-default&lt;/STRONG&gt;, app-id will use it's knowledge of the data flow to determine if the port it sees in the tcp session matches what it sees in the payload, so if a tcp session on port 80 comes in, that's fine, but after it sends payload and app-id determines that the session is actually LDAP, it will drop the connection as it is using a non-default port&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in both the above cases, app-id will keep track of the flow and make sure the application is behaving as expected, applying the right heuristics etc to determine if there are any threats or application switches happening&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;application-override tells app-id and content-id (if used with a custom app) to &lt;EM&gt;not inspect a session at all&lt;/EM&gt; and simply label it as the custom app. so if you set app override on port 80, that opens up port 80 to all underlying applications and &lt;EM&gt;threats&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 06:58:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override-vs-service/m-p/319304#M81896</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-03-30T06:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: application override VS service</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override-vs-service/m-p/319424#M81917</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would suggest to stay away from overrides if you can. They bypass the threat engine so there could be potentially malicious traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 17:05:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override-vs-service/m-p/319424#M81917</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-03-30T17:05:17Z</dc:date>
    </item>
  </channel>
</rss>

