<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Odd traffic going out through an application-specific security rule in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/odd-traffic-going-out-through-an-application-specific-security/m-p/361781#M88223</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/138646"&gt;@BSwientoniowski&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Whenever you have a rule allowing application-default the firewall is going to allow enough traffic to identify the application. So the rule that this traffic is hitting is, if I would have to make an educated guess, the first entry in your security rulebase from trust to untrust that is based off of app-id.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 10 Nov 2020 02:34:53 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2020-11-10T02:34:53Z</dc:date>
    <item>
      <title>Odd traffic going out through an application-specific security rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/odd-traffic-going-out-through-an-application-specific-security/m-p/361684#M88215</link>
      <description>&lt;P&gt;I've got a rule that allows the following applications from&amp;nbsp;any source in our trusted zone out to any destination in the untrust zone.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;appdynamics&lt;/LI&gt;&lt;LI&gt;dns-over-https&lt;/LI&gt;&lt;LI&gt;dns-over-tls&lt;/LI&gt;&lt;LI&gt;github&lt;/LI&gt;&lt;LI&gt;ms-delve&lt;/LI&gt;&lt;LI&gt;net.tcp&lt;/LI&gt;&lt;LI&gt;ntp&lt;/LI&gt;&lt;LI&gt;ocsp&lt;/LI&gt;&lt;LI&gt;okta&lt;/LI&gt;&lt;LI&gt;paloalto-updates&lt;/LI&gt;&lt;LI&gt;paloalto-wildfire-cloud&lt;/LI&gt;&lt;LI&gt;pan-db-cloud&lt;/LI&gt;&lt;LI&gt;rtcp&lt;/LI&gt;&lt;LI&gt;service-now&lt;/LI&gt;&lt;LI&gt;skype&lt;/LI&gt;&lt;LI&gt;ssh&lt;/LI&gt;&lt;LI&gt;windows-azure&lt;/LI&gt;&lt;LI&gt;windows-push-notifications&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The rule is set for application-default.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have some legitimate traffic on our network that goes from trust to untrust with the destination port of tcp/37.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For some reason, this traffic is matching up to this rule.&amp;nbsp; None of the applications in the rule list tcp/37 as a default port.&amp;nbsp; Only two of those applications (skype and net.tcp) have dynamic default ports.&lt;/P&gt;&lt;P&gt;When the tcp/37 traffic hits this rule, the application always shows up as "insufficient-data"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know what the traffic is - it is supposed to be the old "TIME" protocol.&amp;nbsp; I've actually created a rule specific for this further down the list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any idea why the traffic would match up to this rule?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 19:39:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/odd-traffic-going-out-through-an-application-specific-security/m-p/361684#M88215</guid>
      <dc:creator>BSwientoniowski</dc:creator>
      <dc:date>2020-11-09T19:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: Odd traffic going out through an application-specific security rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/odd-traffic-going-out-through-an-application-specific-security/m-p/361781#M88223</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/138646"&gt;@BSwientoniowski&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Whenever you have a rule allowing application-default the firewall is going to allow enough traffic to identify the application. So the rule that this traffic is hitting is, if I would have to make an educated guess, the first entry in your security rulebase from trust to untrust that is based off of app-id.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2020 02:34:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/odd-traffic-going-out-through-an-application-specific-security/m-p/361781#M88223</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-11-10T02:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: Odd traffic going out through an application-specific security rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/odd-traffic-going-out-through-an-application-specific-security/m-p/361909#M88237</link>
      <description>&lt;P&gt;Thanks for the response.&amp;nbsp; The rule that the traffic is hitting is actually the 4th rule in the list going from trust to untrust that is based off of app-id.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2020 12:29:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/odd-traffic-going-out-through-an-application-specific-security/m-p/361909#M88237</guid>
      <dc:creator>BSwientoniowski</dc:creator>
      <dc:date>2020-11-10T12:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: Odd traffic going out through an application-specific security rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/odd-traffic-going-out-through-an-application-specific-security/m-p/362899#M88309</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Also as a suggestion, please use URL filtering as well as DNS sinkholes. Will make your security posture that much better.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 12 Nov 2020 23:14:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/odd-traffic-going-out-through-an-application-specific-security/m-p/362899#M88309</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-11-12T23:14:37Z</dc:date>
    </item>
  </channel>
</rss>

