I use both but running into an issue with Lab specific traffic where I will allow a list of applications with service set to ANY but the PAN classifies some 443 traffic as (for example) 'windows push notification' or 'soap' but I am not allowing either of those APPs so it drops it. I am allowing web-browsing and windows push/soap both use tcp/443 so it seems to be classifying 443 traffic as any application that may or may not use tcp/443. How do I get around having to allow every application that may or may not use 80/443 or any other ports for that matter? I tried setting it to application-default but it still seems to be happening. Not doing any SSL decryption.
What is odd is this seems to be a new problem for me since going to 8.1 from 8.0 for the longest time. Not sure I have run into this before and presently managed roughly 10 HA pairs of PANs across our environment.
I get the whole concept and I am using app-ids on the permit statement and denying everything else across this environment so its not that. What I didn't get is that if I did that and didn't allow whatever traffic pattern was being matched it would be dropped. I assumed, albeit incorrectly, that if I allowed 80/443 and curl uses 80/443 and there is no 'curl' app-id it would be allowed.
You're still missing a bit when it comes to the concept.
If you allow 'web-browsing", then it will only allow traffic that matches the "web-browsing" application. Doesn't matter what generates the traffic (CURL, wget, telnet with manually entered HTTP commands, a web browser, something else), if it matches the "web-browsing" application pattern, then it will be allowed through.
Once it has identified the traffic, then it looks at the ports that are being used and checks those against the Service part of the Security Policy. If it's set to "application-default", then (for web-browsing) it has to be on port 80. If the traffic is on any other port, even if it matches the web-browsing pattern, it will be blocked. If you set the Service to some other port (say 8080), then it has to match that as well. (web-browsing on port 443 is only matched/shown for firewalls doing SSL decryption; otherwise it shows up as "ssl")
So, if you are using curl to connect through the firewall and it's not matching the web-browsing application, then it's not generating traffic that matches the web-browsing application pattern.
When using AppID, the port used only matters when the traffic matches the AppID already. The AppID doesn't "allow all traffic on those ports", it only allows "traffic that matches this pattern, on these ports".
Easy way to look at is, if you don't care about the application, leave it at "ANY" and filter based solely on protocol and port.
So, I am reading your query a few times, and trying to wrap my head around it.
It appears that you you are allowing web-browsing, believing that it will match multiple types of port 80/443 traffic, and I think/believe this is the issue. The AppID uses signature patterns to match what traffic is really going through the FW. For example, Gmail, hotmail,Yahoo Mail, and Xfinity web mail, all use port 443. But the FW is able to determine which traffic is using the applications, by its app-id signature.
Would you want/expect Gmail to be used on the Hotmail/Outlook website? NO... so you do not have a policy for that, right?
So if you see windows-push, then it is (from my experience) the correct window-push, using 443. Do you want window-push to be allowed? If yes, then create/modify a rule to allow the window-push (on app-id).
The FW is designed for explicitly deny, so any traffic that you do not match, will be denied. I think this what you are saying.
Application Default is just the default service port that an app is normally expected to be found on.
For example, do you want DNS on port 5503? No, so you would DNS only on application-default (service port of 53)
Screen capture help, if you feel comfortable to share, but to answer your question, I do believe PANW made changes between 8.0 and 8.1, which may be why you are seeing these types of issues. Respectfully, I think you may need to adapt your security rules.
What other questions can we answer for you?
Yeah that is pretty much it.
I understand it now but I guess I was just assuming if I allowed 80/443 via 'web-browsing' then it would allow all 80/443 and not try and match the traffic to a specific application-id. Having only recently gone to 8.1 and this being a new deployment using the same thought process as the previous ones it was odd to me that it broke a fair amount of connectivity based on not allowing whatever APP the PAN was classifying it as.
For instance users were trying to curl www.google.com and the PAN was classifying that as 'google-base' but I would never equate curl to google-base (no curl app-id) so I would have never allowed it. Its only when I looked at the logs I saw what it was doing and once I allowed google-base the curl commands worked.
Anyways if I wanted to allow outbound 80/443 and not match any application how would I do that?
With all respect... you have a L7 FW, you should WANT to match all apps using the correct application vs L3/L4 port and protocol rules.
What was the purpose of moving from a traditional FW to a NGFW, if you are looking to use the simliar wide open, policies.
Bad apps such as bittorrent, proxy anonymizing apps are all using 443 ports. You should determine what apps you do NOT want to go across the FW, and then allow only those you DO want. There are 3100 apps. Do you really need all 3100 apps through the FW? Maybe you can look at past reports to see what apps are really being used vs opening up all of them.
It is definitely against against all best practices to allow "app any" "service 80/443" ports.
My suggestion is this.
After the very bottom of you policy, create a policy for allow ALL (so app any, service any)
Then create a policy above that, that allows any app, as long as it is using the correct application-default service ports.
You will see more hits on your "app-id" rule than your L3/L4 rule. 😛
Then you can start to determine what types of apps do NOT need to go through the firewall (high risk apps, gaming apps, proxy anonymizer apps, etc), and you can start to create good vs bad app policies.
This is way more secure than what you are trying to do, and we will all encourage you NOT to do just port/protocol rules.
I wish I could remember what our PA rep told me about actual application-id adoption rate, but it was something paltry at best across the board. Either way I know how to configure them and I think you missed the point of my argument. Which was why is curl being classified as google-base? I was also simply asking how to allow 80/443 and NOT classify the traffic at the same time. Whether I do that or not is really up to me.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!