- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
07-03-2013 09:46 AM
Does Palo Alto have a signature to detect the use of ssh on non-standard ports like 443? I did not see anything in the threat database.
Thanks,
Jim
07-03-2013 11:24 AM
you need to packet capture the traffic for that.
if you can, it is possible to add custom signature from objects/custom signature tab.
07-03-2013 11:15 AM
I don't see a signature for that.
you can use security rule with application default to allow only it's default port for ssh or using services with that rule for other ports.
07-03-2013 11:19 AM
Thanks. I will give that a try. Is it possible to request new signatures and if so how would I do that?
Thanks,
Jim
07-03-2013 11:24 AM
you need to packet capture the traffic for that.
if you can, it is possible to add custom signature from objects/custom signature tab.
07-03-2013 01:58 PM
As panos said, that's a rule not a signature. Going back, you can go to Monitor->Traffic and search for (port eq 443) and (app neq ssl) or perhaps (port neq 22) and (app eq ssh).
While you're in the neighborhood, if you have a loose policy and are creating denies, also consider a rule to deny things like crossloop, gre, hamachi, ipsec, ipv6, teredo, and an application filter that looks for subcategory=proxy.
07-05-2013 05:44 AM
Great advise. Thanks!
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!