commit status warning on rules that are working the way I want them too

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

commit status warning on rules that are working the way I want them too

L4 Transporter

I have a rule that has webex enabled but dones not have ssl enabled and i keep getting a warning on that rule when i commit that says "Applicaiton 'webex-desktop-sharing requires ssl be allowed? But I don't want to allow ssl, so how can I get rid of these warnings so i can tell when i have a legitimate commit warning?

40 REPLIES 40

@jdprovine

I absolutely agree. In some cases it's not only annoying, it of course also obscure real warnings and errors. 

 

So a feature like a simple checkbox "ignore application dependencies" in the commit status would be helpful.

@BPry

 

So you are saying that just because I have some rule somewhere else allowing ssl traffic , but not specifically added to the google-play rule I have, it will still allow the rule I don't want to use ssl to use ssl from another rule? (can I say rule one more time :)) Thats doesn't sound good, it sounds like I have defeated the purpose of not adding it to my google-play rule

@Remo

 

The bigger issue to me, is that is appears that it is allowing that rule to do or allow something, like ssl,  that I don't want allowed to be allowed (can i say allowed 1 more time :))

@jdprovine,

Unless this one computer is excluded from the existing policies allowing general access, then yes.

Keep in mind that even if a computer is completely segregated and you've only allowed it access to one specific application (say google-play) the firewall will still allow a small amount of traffic to pass so that it can properly identify the traffic. If the traffic doesn't match google-play then it will start dropping all traffic, but it needs that small amount of traffic to see if the traffic actually matches google-play. 

L7 Applicator

@jdprovine

It now only depends on how much effort you want to spend to get rid of some or most of these warnings, as there is no easy checkbox to ignore and hide these.

 

In the example for google play you could analyze what URLs you have in that rule alllwing google play. With these rules you then create a custom URL category and add this category to the google-play rule in addition to the application ssl and google-base. This way the warning should be gone and you do not allow general internet access.

This method probably also works with webex and spotify for example. To even further limit it, you could also specify ip addresses. At least for the google rule this is possible, as google publishes all their IP ranges. For the other two examples I don't know.

@Remo,

Speaking from experiance both WebEx and Spotify both do a pretty good job of specifying their IP addresses. 

 

Spoitfy: 78.31.8.0/22 with URL ap.spotify.com

 

WebEx: Depends on the region but for AMER

64.68.96.0/19

66.114.160.0/20

66.163.32.0/19

173.39.224.0/19

173.243.0.0/20

207.182.160.0/19

209.197.192.0/19

216.151.128.0/19

and the URLs would be 

*.webex.com

*.ciscowebex.com

*.webexconnect.com

*.wbx2.com

*.ciscospark.com

(Not really needed but requested) 

*.localytics.com

*.rackcdn.com

*.clouddrive.com

*.crashlytics.com

*.js-agent.newrelic.com

*.bam.nr-data.net

(CRL)

*.quovadisglobal.com

 

@jdprovine,

Pretty much every warning can be eliminated through gathering the IP ranges and/or the URLs that the service actually uses, but as @Remo stated this can all take quite a bit of time to gather up and actually configure. 

@Remo @BPry

Great suggestions, I just want to keep my commit status message reasonable, it appears to be growing longer 

Here is another interesting commit status dependency warning

 

"Rule 14 application dependency warning: Application ms-update requires ssl be allowed but ssl is denied in rule 15. " Why is an application in the rule above getting on a rule below it?

This one is pretty clear I think. Rule 15 probably is your deny-all or an explicit deny-ssl rule. So the firewall checks the dependencies and also informes you where this dependency would be blocked. 

@Remo

that makes sense since it is not allowed in rule 14 it moves to rule 15 which is a deny and never finds a rule that will allow it. 

@jdprovine

You might want to ask your SE about the feature requests 1887, 2689, 4131. According to another topic here in the community these FR IDs all head in the direction of implizit allowing some application dependencies as long as the the actual app that you effectively want to allow shows up. Negativ part of something like that is probably that (a lot) more traffic needs to be allowed until the firewall knows for sure if it has to allow or drop further traffic.

  • 8080 Views
  • 40 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!