- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
When it comes to setting up rules, there are a lot of components that make up these rules. One of the more confusing parts I've been asked about is this thing called "application-default" under the Service section.
The "Service/URL Category" section is where you have the opportunity to specify the port that the application operates on.
The Web-browsing application for example uses TCP port 80.
When you're setting up a rule, under the "Service/URL Category" tab you'll notice a dropdown menu on the left side of the screen. Here, you'll come across three options:
Let me explain what each of these options means:
Let's review this with an easy to understand example:
The first rule in the above example is set up to allow the DNS application, specifically on UDP port 53. This means that DNS traffic will only be allowed on that specific port. The second rule allows the DNS application as well, but it utilizes the "application-default" setting. This means that the DNS application will be allowed on its default ports, as defined by Palo Alto Networks.
That means that if DNS was using TCP port 53, it would not match on the first rule (which only allows UDP port 53).
There will be a match on the second rule. So why is that and how does it know ?
To understand this better you'll want to explore the DNS application. Under Objects > Applications search for "DNS" and select the "dns-base" application (*). This will take you to a screen where you can view detailed information about this application. Alternatively you can find the same information online in Palo Alto Networks' Applipedia.
Notice the listed default ports for the application: udp/53,5353, tcp/53
Following our example from above, the first rule allow DNS only over UDP port 53. DNS using TCP port 53 or port 5353 would not match this rule because the "application-default" option was not set. This example highlights the convenience of using "application-default" instead of trying to specify each individual TCP or UDP port, making the rule configuration process much simpler.
This also applies to rules where the application is set to "any". In such cases, it guarantees that regardless of the identified application, traffic will be restricted to using the standard ports only.
For all you CLI fanboys/girls out there, you can also check the application-default ports using the CLI (don't forget to go into configuration mode first !):
> configure
Entering configuration mode
[edit]
# show predefined application dns
dns {
category networking;
subcategory infrastructure;
technology network-protocol;
alg yes;
appident yes;
ident-by-sport yes;
ident-by-dport yes;
vulnerability-ident yes;
evasive-behavior no;
consume-big-bandwidth no;
used-by-malware yes;
able-to-transfer-file no;
has-known-vulnerability yes;
tunnel-other-application no;
prone-to-misuse no;
pervasive-use yes;
per-direction-regex no;
decode dns;
preemptive yes;
cachable yes;
file-forward yes;
references {
Wikipedia {
link http://en.wikipedia.org/wiki/Domain_name_system;
}
}
default {
port [ tcp/53 upd/53,5353];
extended-port [ tcp/53 tcp/853/secure udp/53,5353];
}
tunnel-applications tcp-over-dns;
risk 3;
}
(*) NOTE: Important to know that in the DNS example used above the app-id decoder was enhanced in content version 8586-7445 to include dns-base and dns-non-rfc.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Subject | Likes |
---|---|
4 Likes | |
3 Likes | |
3 Likes | |
2 Likes | |
2 Likes |
User | Likes Count |
---|---|
11 | |
4 | |
3 | |
2 | |
2 |