<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is it better to have policy rules base on application instead of service ports? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-better-to-have-policy-rules-base-on-application-instead-of/m-p/12806#M9385</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jones.&amp;nbsp; I have a more clear understanding now. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Aug 2011 06:49:52 GMT</pubDate>
    <dc:creator>u7541</dc:creator>
    <dc:date>2011-08-12T06:49:52Z</dc:date>
    <item>
      <title>Is it better to have policy rules base on application instead of service ports?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-better-to-have-policy-rules-base-on-application-instead-of/m-p/12802#M9381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm migrating a traditional layer 4 firewall policy to PAN firewall.&amp;nbsp; I'm wondering if I should convert all policies to application id based, or I should leave it as service ports based, or I should do both (i.e. app-id + server ports)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jul 2011 10:16:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-it-better-to-have-policy-rules-base-on-application-instead-of/m-p/12802#M9381</guid>
      <dc:creator>u7541</dc:creator>
      <dc:date>2011-07-22T10:16:42Z</dc:date>
    </item>
    <item>
      <title>Re: Is it better to have policy rules base on application instead of service ports?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-better-to-have-policy-rules-base-on-application-instead-of/m-p/12803#M9382</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Probably a mix of both, as PA doesn't know about all possible applications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For web filetering rules, application based is good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now for datacenter/production needs ... what would happen if suddendly after an APP ID update , it won't recognize MSSQL protocol ? In addition, many apps aren't running on officially supported ports.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jul 2011 11:33:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-it-better-to-have-policy-rules-base-on-application-instead-of/m-p/12803#M9382</guid>
      <dc:creator>lardsa</dc:creator>
      <dc:date>2011-07-22T11:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: Is it better to have policy rules base on application instead of service ports?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-better-to-have-policy-rules-base-on-application-instead-of/m-p/12804#M9383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In most cases, I would not recommend leaving the service/port definition as "any", particularly on inbound rules. For inbound rules, there is not really a good reason to wait to drop a session based on App-ID when you know you don't want the traffic coming in on that port in the first place. As a general rule, inbound policy should always include "application-default" or the specific port you know you have the service running on. For outbound rules, it is best to have the firewall policy reflect what your intention is. For example, if you want to allow users to run web-browsing or ssh on random ports, use "any" in the service column and they will be allowed to do that. I wouldn't necessarily recommend that, but the key is the write the policy that is appropriate for your environment. When you are protecting servers, allowing traffic on random ports is almost always a bad idea. When you are protecting users, it may still be a bad idea, but that will largely depend on your environment and the risk you are willing to allow and the threat protection you are employing on the outbound (and inbound response) traffic. Generally speaking, the smaller you can get the surface area of exposure, the better you can manage the risk. App-ID allows you to do that in important ways, but it doesn't mean you should increase the port-based surface area just because you can.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jul 2011 14:58:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-it-better-to-have-policy-rules-base-on-application-instead-of/m-p/12804#M9383</guid>
      <dc:creator>mjacobsen</dc:creator>
      <dc:date>2011-07-22T14:58:35Z</dc:date>
    </item>
    <item>
      <title>Re: Is it better to have policy rules base on application instead of service ports?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-better-to-have-policy-rules-base-on-application-instead-of/m-p/12805#M9384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No solution can identify apps before the TCP 3 way handshaking completes. For traditional fw, the port based policy can make traffic deny decision by the syn packet which contains port no./service and IP information. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For PA, if you choose "any" for service, that means you are ignoring the port no. check and we will allow a lot of first few packets from connections coming in/ sending out until we identify the app after we receive the fourth or later packets. So in order to make PA to be really "more secure" than a traditional fw and allowing less packets that we should not allow than a traditional fw, you should put at least application-default for a policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Aug 2011 03:49:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-it-better-to-have-policy-rules-base-on-application-instead-of/m-p/12805#M9384</guid>
      <dc:creator>jleung</dc:creator>
      <dc:date>2011-08-06T03:49:10Z</dc:date>
    </item>
    <item>
      <title>Re: Is it better to have policy rules base on application instead of service ports?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-it-better-to-have-policy-rules-base-on-application-instead-of/m-p/12806#M9385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jones.&amp;nbsp; I have a more clear understanding now. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Aug 2011 06:49:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-it-better-to-have-policy-rules-base-on-application-instead-of/m-p/12806#M9385</guid>
      <dc:creator>u7541</dc:creator>
      <dc:date>2011-08-12T06:49:52Z</dc:date>
    </item>
  </channel>
</rss>

