I have a question regarding the "AppID override" ,
In this article "https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVLCA0" we can read the following:
Special Note about Content and Threat inspection
Application Override to a custom application will force the firewall to bypass Content and Threat inspection for the traffic that is matching the override rule. The exception to this is when you override to a pre-defined application that supports threat inspection.
However, in the PaloAlto Packet Flow Sequence (available : http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309) we can see this :
When the application override policy is matched the only step skiped is [Pattern-based application identification]. The "Content Inspection (SP3/CTD)" is allways performed, regardless of the application override. So the Content profiles seem to be applyed.
So my question is the following: is something missing from the diagram or am I wrongly reading the graph ?
Yes, it works as described in the article here "https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVLCA0" ... either I misunderstand something or the Packet flow is a bit missleading :(
Hi, I will recommend close this threat here and re open it under the Firewall Community, This is for Expedition and it doesnt capture the attention of everybody :-)
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!