<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How packets match security policy when when application are incomplete or insufficient in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-packets-match-security-policy-when-when-application-are/m-p/378847#M89521</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/139105"&gt;@nattapong_thi&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You would expect traffic to hit Rule A in your example. The reason for this is that the firewall needs to allow enough traffic to actually identify the application, so when you specify an app-id of 'dns' and use service of 'any', you are effectively telling the firewall to allow traffic across any port until it's able to identify the application. As soon as the application is identified, then the traffic would be re-analyzed to see what rulebase entry matches the newly identified traffic, if any.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Jan 2021 21:58:19 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2021-01-10T21:58:19Z</dc:date>
    <item>
      <title>How packets match security policy when when application are incomplete or insufficient</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-packets-match-security-policy-when-when-application-are/m-p/378817#M89518</link>
      <description>&lt;P&gt;&lt;FONT face="helvetica" size="3"&gt;For an example, I have 2 security policies&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="book antiqua,palatino" size="4" color="#FF0000"&gt;ruleA) source ip: any, source zone: any, destination ip: any, destination zone: any, &lt;STRONG&gt;application: dns&lt;/STRONG&gt;, service: any, action allow&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="book antiqua,palatino" size="4" color="#0000FF"&gt;ruleB)&amp;nbsp;source ip: any, source zone: any, destination ip: any, destination zone: any, &lt;STRONG&gt;application: any&lt;/STRONG&gt;, service: any, action allow&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;and traffic initiate from client is DNS request port53, my question is when Paloalto still not know the application yet (or application is incomplete), which policy will apply for the traffic?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pls share me a reference guide also, Thank you in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Jan 2021 09:14:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-packets-match-security-policy-when-when-application-are/m-p/378817#M89518</guid>
      <dc:creator>nattapong_thi</dc:creator>
      <dc:date>2021-01-10T09:14:35Z</dc:date>
    </item>
    <item>
      <title>Re: How packets match security policy when when application are incomplete or insufficient</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-packets-match-security-policy-when-when-application-are/m-p/378847#M89521</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/139105"&gt;@nattapong_thi&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You would expect traffic to hit Rule A in your example. The reason for this is that the firewall needs to allow enough traffic to actually identify the application, so when you specify an app-id of 'dns' and use service of 'any', you are effectively telling the firewall to allow traffic across any port until it's able to identify the application. As soon as the application is identified, then the traffic would be re-analyzed to see what rulebase entry matches the newly identified traffic, if any.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Jan 2021 21:58:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-packets-match-security-policy-when-when-application-are/m-p/378847#M89521</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-01-10T21:58:19Z</dc:date>
    </item>
    <item>
      <title>Re: How packets match security policy when when application are incomplete or insufficient</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-packets-match-security-policy-when-when-application-are/m-p/378938#M89526</link>
      <description>&lt;P&gt;This is why 'application-default' is very important in the service of a security rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when the firewall accepts the very first packet of a session, it will only be able to identify the '6-tuple'&lt;/P&gt;&lt;P&gt;source subnet, source zone, destination subnet, destination zone, destination port and protocol&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it will then go look for a security rule that matches those criteria; so in your case ruleA will be hit by everything,even a SYN packet for port 80&lt;/P&gt;&lt;P&gt;once App-ID is able to identify the session is in fact http (by packet 4 due to the HTTP GET), it will re-evaluate the security rules and match ruleB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if the syn is never responded to (incomplete), the session will die on ruleA as there will not be a reason to re-evaluate security rules until a new application is identified&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you set application-default, ruleA will be limited to port53 TCP/UDP, so connections on port80 will automatically drop to ruleB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;one step further: if, for example, ruleA is dns and ruleB is ssl, both with service application-default: a SYN packet for port 80 will automatically be discarded on the implied interzone drop rule, since only ports that match one of the defined applications will be allowed through so a session can be created.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 12:11:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-packets-match-security-policy-when-when-application-are/m-p/378938#M89526</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2021-01-11T12:11:18Z</dc:date>
    </item>
  </channel>
</rss>

