<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic App-ID for known services being blocked and not categorised as &amp;quot;ssl&amp;quot;. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-for-known-services-being-blocked-and-not-categorised-as/m-p/433122#M95827</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have a Palo Alto running v&lt;SPAN&gt;9.0.9-h1 with an outbound to Internet rule which as follows:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;From: Internal Networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;To: Internet External&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Application: ssl&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What we are trying to achieve is for the firewall to ensure that only SSL/TLS traffic is allowed outbound.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The issue is that that the firewall categorises well-known services such as Salesforce, LinkedIn, Office365 as specific App-IDs and thus blocks traffic and we are having to add each required application individually.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;A potential workaround is to drop Application=ssl, and add Service=TCP:443 - But doing this we lose the layer 7 inspection and &lt;EM&gt;&lt;STRONG&gt;could&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;allow a user to send HTTP over the 443 port which isn't ideal.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there a way to have the Palo categorise as ssl and then stop processing App-ID to get the best of both worlds?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks!&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 10 Sep 2021 15:21:05 GMT</pubDate>
    <dc:creator>Sean65</dc:creator>
    <dc:date>2021-09-10T15:21:05Z</dc:date>
    <item>
      <title>App-ID for known services being blocked and not categorised as "ssl".</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-for-known-services-being-blocked-and-not-categorised-as/m-p/433122#M95827</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have a Palo Alto running v&lt;SPAN&gt;9.0.9-h1 with an outbound to Internet rule which as follows:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;From: Internal Networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;To: Internet External&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Application: ssl&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What we are trying to achieve is for the firewall to ensure that only SSL/TLS traffic is allowed outbound.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The issue is that that the firewall categorises well-known services such as Salesforce, LinkedIn, Office365 as specific App-IDs and thus blocks traffic and we are having to add each required application individually.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;A potential workaround is to drop Application=ssl, and add Service=TCP:443 - But doing this we lose the layer 7 inspection and &lt;EM&gt;&lt;STRONG&gt;could&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;allow a user to send HTTP over the 443 port which isn't ideal.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there a way to have the Palo categorise as ssl and then stop processing App-ID to get the best of both worlds?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Sep 2021 15:21:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-for-known-services-being-blocked-and-not-categorised-as/m-p/433122#M95827</guid>
      <dc:creator>Sean65</dc:creator>
      <dc:date>2021-09-10T15:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: App-ID for known services being blocked and not categorised as "ssl".</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-for-known-services-being-blocked-and-not-categorised-as/m-p/433143#M95829</link>
      <description>&lt;P&gt;From a security posture perspective, this is a bad idea. Attackers have C2 beacons regularly encrypted down SSL tunnels now. Writing a pervasive rule to allow anything that uses that underlying technology is a risk that enterprise networks should not assume. Verify first, trust second.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What you should do is go to the objects tab, search ssl and SSL in the searchbar. Of the applications that come up, edit the tags and add "sanctioned" to the ones you want.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screen Shot 2021-09-10 at 10.59.18 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36316i4BBE413135283A01/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2021-09-10 at 10.59.18 AM.png" alt="Screen Shot 2021-09-10 at 10.59.18 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After you have chosen your sanctioned applications, go down 2 menus of the objects tab and create a filter to allow all sanctioned apps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screen Shot 2021-09-10 at 10.59.43 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36317i04C87B9549D8EA91/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2021-09-10 at 10.59.43 AM.png" alt="Screen Shot 2021-09-10 at 10.59.43 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then you are able to write an outbound policy allow rule to all the filtered/sanctioned apps you wish.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Sep 2021 17:50:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-for-known-services-being-blocked-and-not-categorised-as/m-p/433143#M95829</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2021-09-10T17:50:33Z</dc:date>
    </item>
    <item>
      <title>Re: App-ID for known services being blocked and not categorised as "ssl".</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-for-known-services-being-blocked-and-not-categorised-as/m-p/433144#M95830</link>
      <description>&lt;P&gt;Hi Slick, thanks for the response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue we're having is for outbound Intenet browsing which this is, we don't know what applications are required until they are blocked, then requiring a support ticket, analysis and a firewall change.&amp;nbsp; The turn around for this is 5 days minimum, that is significant impact.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The business is putting pressure on us to simply allow TCP:443 outbound in which case we lose all L7 capability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any further thoughts?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Sep 2021 16:22:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-for-known-services-being-blocked-and-not-categorised-as/m-p/433144#M95830</guid>
      <dc:creator>Sean65</dc:creator>
      <dc:date>2021-09-10T16:22:13Z</dc:date>
    </item>
    <item>
      <title>Re: App-ID for known services being blocked and not categorised as "ssl".</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-for-known-services-being-blocked-and-not-categorised-as/m-p/433164#M95832</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screen Shot 2021-09-10 at 12.52.00 PM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36321i28D6BE993DCD6458/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2021-09-10 at 12.52.00 PM.png" alt="Screen Shot 2021-09-10 at 12.52.00 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could write a pervasive allow 443 rule but use it for only a few days, and then use the policy optimizer in the bottom left to see which apps touch the rule, and then click the checkbox to add them to a sanctioned rule as well.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Sep 2021 17:54:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-for-known-services-being-blocked-and-not-categorised-as/m-p/433164#M95832</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2021-09-10T17:54:01Z</dc:date>
    </item>
    <item>
      <title>Re: App-ID for known services being blocked and not categorised as "ssl".</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-for-known-services-being-blocked-and-not-categorised-as/m-p/433408#M95865</link>
      <description>&lt;P&gt;While that sounds like something which we *could* do, that doesn't meet our needs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To restate the requirement: We need to allow &lt;STRONG&gt;ALL&lt;/STRONG&gt; SSL based applications by default outbound for Internet browsing but still have the firewall perform L7 inspection to ensure the traffic is actually SSL (like it would do for unknown SSL based applications).&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 08:38:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-for-known-services-being-blocked-and-not-categorised-as/m-p/433408#M95865</guid>
      <dc:creator>Sean65</dc:creator>
      <dc:date>2021-09-13T08:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: App-ID for known services being blocked and not categorised as "ssl".</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/app-id-for-known-services-being-blocked-and-not-categorised-as/m-p/433582#M95891</link>
      <description>&lt;P&gt;What you are asking for is not in the Palo Alto ethos. The product is built for positive enforcement, meaning there are no explicit allows. We found this to be too big a security risk, and for zero trust, most companies are moving toward a positive enforcement model.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if you wrote a rule that was "allow any application from internal to external on any port" for a day or two, you could then use policy optimizer to restrict the function down to L7 policies because it would default allow, and then you could segment which traffic flows belong to which rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The L7 and content inspection is always happening, even on an allow all rule (as long as you attach a security profile group to the traffic), the APP-ID for the rule occurs as well.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;But you're asking for something to be done that the industry is actively trying to move away from in which Palo pioneered. It's possible by doing the above.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 17:53:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/app-id-for-known-services-being-blocked-and-not-categorised-as/m-p/433582#M95891</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2021-09-13T17:53:32Z</dc:date>
    </item>
  </channel>
</rss>

