<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need help with logging in case of App-Id in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/need-help-with-logging-in-case-of-app-id/m-p/388286#M90471</link>
    <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Log1.JPG" style="width: 887px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30108i7654AB9EDF99A35B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Log1.JPG" alt="Log1.JPG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Log2.JPG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30107i88023ED214B2511C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Log2.JPG" alt="Log2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt; ... Thanks for your quick response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have allowed application "app-discovery-request" in list of allowed applications when traffic going from Inside to Outside Zone. As per you, while trying to install session it considers destination ports which are being used applications allowed in policy. In my case, application&amp;nbsp;"app-discovery-request" uses udp dynamic range which means it can use or allow any udp port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let us suppose if someone tries to make connection for an application which uses udp port 1194 (for example, open-vpn application), should the traffic for this application using udp port 1194 hitting this existing policy where I did not allow open-vpn but allowed&amp;nbsp;"app-discovery-request" which uses dynamic udp ports and 1194 can also be a part of this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have also attached logs from my firewall which I can see for udp port 1194. As per you, if application is not allowed in explicit rule, then it should be hitting default deny policy after application identification is completed. However, I see this behavior in logging of traffic logs. Is the firewall logging correctly traffic logs or is there any issues with logging behavior of PALO ALTO. Let me know your thoughts as it will clear a lot of things and I will be able to plan it accordingly for future cases.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will&amp;nbsp; be waiting for your kind response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;</description>
    <pubDate>Sun, 28 Feb 2021 07:07:58 GMT</pubDate>
    <dc:creator>GSOC-SCJohnson</dc:creator>
    <dc:date>2021-02-28T07:07:58Z</dc:date>
    <item>
      <title>Need help with logging in case of App-Id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/need-help-with-logging-in-case-of-app-id/m-p/387868#M90438</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have below rule in my Palo Alto and another default rules which are Intra-zone and Inter-zone.&lt;/P&gt;&lt;P&gt;Source: 10.0.0.0/8&lt;/P&gt;&lt;P&gt;Source Zone: Trust&lt;/P&gt;&lt;P&gt;Destination: Any&lt;/P&gt;&lt;P&gt;Destination Zone: Untrust&lt;/P&gt;&lt;P&gt;Application: ssl, web-browsing, dns, Facebook-base, YouTube-base, etc&lt;/P&gt;&lt;P&gt;Service: Application-default&lt;/P&gt;&lt;P&gt;Action: Allow&lt;/P&gt;&lt;P&gt;Log: At session end&lt;/P&gt;&lt;P&gt;I am trying to understand behaviour of Palo Alto in terms of Application-Id and traffic logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let us suppose if someone tries to establish connection using for port udp/1194 or any other tcp port using nmap, which apps allowed in my explicit policy are not using. Which policy will this traffic be hitting when traffic is going from 10.0.0.0/8 network to Untrust zone for Any destination. What will be I seeing in logs.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2021 19:47:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/need-help-with-logging-in-case-of-app-id/m-p/387868#M90438</guid>
      <dc:creator>GSOC-SCJohnson</dc:creator>
      <dc:date>2021-02-25T19:47:15Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with logging in case of App-Id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/need-help-with-logging-in-case-of-app-id/m-p/388036#M90451</link>
      <description>&lt;P&gt;in terms of establisghing a connection, the 'application-default' setting will populate the rule with all the ports associated with the applications you list, so in your case 53, 80 and 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any connection coning in on a different port will drop down to the interzone rule and be discarded&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any connection coming in on one of the allowed ports will be accepted and will cause a session to be created and packets to flow&lt;/P&gt;&lt;P&gt;at this point (typically tcp handshake) the app-id will not be known yet so for a tcp session at least 3 packets will be allowed to flow back and forward, for DNS there would be an immediate decission to allow or drop down to intraone as the first packet already contains identifiable payload&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when tcp starts to talk payload, app-id will be able to identify if an app is alowed or not, so if at some point SQL is identified while communicating over port 443, the session will no longer match your rule and drop down to the interzone rule and be discarded mid-flow&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 11:56:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/need-help-with-logging-in-case-of-app-id/m-p/388036#M90451</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2021-02-26T11:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with logging in case of App-Id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/need-help-with-logging-in-case-of-app-id/m-p/388286#M90471</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Log1.JPG" style="width: 887px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30108i7654AB9EDF99A35B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Log1.JPG" alt="Log1.JPG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Log2.JPG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30107i88023ED214B2511C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Log2.JPG" alt="Log2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt; ... Thanks for your quick response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have allowed application "app-discovery-request" in list of allowed applications when traffic going from Inside to Outside Zone. As per you, while trying to install session it considers destination ports which are being used applications allowed in policy. In my case, application&amp;nbsp;"app-discovery-request" uses udp dynamic range which means it can use or allow any udp port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let us suppose if someone tries to make connection for an application which uses udp port 1194 (for example, open-vpn application), should the traffic for this application using udp port 1194 hitting this existing policy where I did not allow open-vpn but allowed&amp;nbsp;"app-discovery-request" which uses dynamic udp ports and 1194 can also be a part of this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have also attached logs from my firewall which I can see for udp port 1194. As per you, if application is not allowed in explicit rule, then it should be hitting default deny policy after application identification is completed. However, I see this behavior in logging of traffic logs. Is the firewall logging correctly traffic logs or is there any issues with logging behavior of PALO ALTO. Let me know your thoughts as it will clear a lot of things and I will be able to plan it accordingly for future cases.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will&amp;nbsp; be waiting for your kind response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2021 07:07:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/need-help-with-logging-in-case-of-app-id/m-p/388286#M90471</guid>
      <dc:creator>GSOC-SCJohnson</dc:creator>
      <dc:date>2021-02-28T07:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with logging in case of App-Id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/need-help-with-logging-in-case-of-app-id/m-p/388316#M90481</link>
      <description>&lt;P&gt;This KB might help. Basically 4 packets or 2000 bytes are allowed for the appid engine to try to identify the app.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClIgCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClIgCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- DM&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2021 14:49:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/need-help-with-logging-in-case-of-app-id/m-p/388316#M90481</guid>
      <dc:creator>dmifsud</dc:creator>
      <dc:date>2021-02-28T14:49:45Z</dc:date>
    </item>
  </channel>
</rss>

