@SShnap wrote: > I think they should release an application list update, which add working port 443 for web-browsing application. > > I also notice that once you decrypt traffic on 443-SSL it becomes 443-web-browsing, so policy rule that allow web-browsing on application-default will not work, because the application-default is 80. > > You need to create another policy to allow web-browsing application on 443 port. I had to hold my tongue (well, fingers) because 9.0 hadn't been released yet, but now that it is available I can share this: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-new-features/app-id-features/app-default-strict.html Now, in PAN-OS 9.0, if an application has a known secure port like web-browsing, your app-based allow rule will work with application-default when decrypting. Currently the app list is web-browsing, SMTP, FTP, LDAP, POP3, and IMAP. Palo Alto Networks can update that list as well via a content update.
... View more