05-17-2013 01:58 PM
I know that these two applications stand for unrecognized traffic. It worries me though that for some of the other applications to work, I have to add unknown-tcp/udp to the firewall rule. Example for this would be Bittorrent traffic. To allow Bittorrent, I also have to allow web-browsing and unknown-tcp and unknown-udp.
Can someone please elaborate on this? If I only want to allow Bittorrent, but also add web-browsing and unknown-tcp, I will open up the firewall for unwanted traffic. I really have a hard time understand this concept.
05-18-2013 05:33 AM
So that means, if there are dependencies:
1.) It will resolve them automatically and add the needed services, invisible to the user.
2.) Because of that, I don't what what I actually allow through my firewall.
Excuse my ignorance, but are you guys serious?
05-18-2013 06:48 AM
I quote what is reported in PANOS v.5 release note:
Application Dependency Enhancement – For some protocols, you can allow an application in security policy without explicitly allowing its underlying protocol. This support is available if the application can be identified within a pre-determined point in the session, and has a dependency on any of the following applications: HTTP, SSL, MSRPC, RPC, t.120, RTSP, RTMP, and NETBIOS-SS. Custom applications based on HTTP, SSL, MS-RPC, or RTSP can also be allowed in security policy without explicitly allowing the underlying protocol. For example, if you want to allow Java software updates, which use HTTP (web-browsing), you no longer have to allow web-browsing. This feature will reduce the overall number of rules needed to manage policies.
This means that few applications can use this enchantment and you never allow unwanted applications. Be aware of how PA recognize application: for example application facebook relies on web-browsing because before facebook the frewall recognize in fact web-browsing app. So the programmer ask themself why not having an implicit application allowing?
Please do not mix together app and service (ports) these are different variables in security rules, as an advice try to use always application defaults as policy enforcement.
If you keep log option for security rule you are always able what traversed the firewall. Also always in session browser (cli/gui) you can see which kind of app traffic is flowing even with a permit all policy, this is the strength of these devices.
05-18-2013 07:30 AM
Is this the same cryptochrome from the infamous why "NSM is a piece of crap" forum? I happened to be the first one to reply to that post.
05-18-2013 09:40 AM
yep. that's the same Cryptochrome :smileygrin:
05-19-2013 01:49 PM
Slightly off-topic but I guess this is the thread you both are refering to ? 🙂
Want some examples why NSM is a piece of junk? - J-Net Community
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!