- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
05-17-2013 01:58 PM
Hi,
I know that these two applications stand for unrecognized traffic. It worries me though that for some of the other applications to work, I have to add unknown-tcp/udp to the firewall rule. Example for this would be Bittorrent traffic. To allow Bittorrent, I also have to allow web-browsing and unknown-tcp and unknown-udp.
Can someone please elaborate on this? If I only want to allow Bittorrent, but also add web-browsing and unknown-tcp, I will open up the firewall for unwanted traffic. I really have a hard time understand this concept.
Thanks
05-18-2013 06:48 AM
I quote what is reported in PANOS v.5 release note:
Application Dependency Enhancement – For some protocols, you can allow an application in security policy without explicitly allowing its underlying protocol. This support is available if the application can be identified within a pre-determined point in the session, and has a dependency on any of the following applications: HTTP, SSL, MSRPC, RPC, t.120, RTSP, RTMP, and NETBIOS-SS. Custom applications based on HTTP, SSL, MS-RPC, or RTSP can also be allowed in security policy without explicitly allowing the underlying protocol. For example, if you want to allow Java software updates, which use HTTP (web-browsing), you no longer have to allow web-browsing. This feature will reduce the overall number of rules needed to manage policies.
This means that few applications can use this enchantment and you never allow unwanted applications. Be aware of how PA recognize application: for example application facebook relies on web-browsing because before facebook the frewall recognize in fact web-browsing app. So the programmer ask themself why not having an implicit application allowing?
Please do not mix together app and service (ports) these are different variables in security rules, as an advice try to use always application defaults as policy enforcement.
If you keep log option for security rule you are always able what traversed the firewall. Also always in session browser (cli/gui) you can see which kind of app traffic is flowing even with a permit all policy, this is the strength of these devices.
05-17-2013 02:21 PM
Allowing unknown-tcp/udp to allow BitTorrent traffic should not be required. On my device I have utilized BitTorrent with and without encryption over the last few weeks and the traffic logs show that none of the sessions are being identified as unknown-tcp/udp. It's possible this issue is specific to the torrent you are accessing.
The web-browsing component could be required for the tracker communication which can utilize HTTP.
If you see this issue on the latest content then I would recommend opening a support case for investigation.
05-18-2013 02:00 AM
Bittorent doesn't depend on unknown tcp/udp, only web-browsing on tcp/udp dynamic ports. If you have 5.0.x this dependence is already done, otherwise a rule has to be inserted for allowing web-browsing before bittorent.
Verify the app dynamic update (latest 373-1793) and in case of other error/warning during commit also I suggest opening a support case.
05-18-2013 03:07 AM
Ok, you are right, there are no warnings anymore about uknown-tcp on commit. However, you are saying that 5.0 automatically resolves those dependencies, does that mean it will actually include the needed services without me specifying them in the rule? That would mean it will still open unknown-tcp/udp.
Bittorrent was just an example. I've seen this dependency with other apps as well. If other apps rely on unknown-tcp/udp, doesn't that make the whole thing completely insecure? I am opening up the firewall for unknown traffic.
05-18-2013 04:39 AM
In PANOS 4.x all application dependencies have to be explicit allowed in security rules, otherwise warning during may appear and related application could not work properly. Sometimes in large scale this requirement could be annoying or worse.
Version 5.0.x changes this behavior allowing application dependencies if they are granular web-browsing, ssl, ftp and few more. Never unknown traffic, if needed, this have to be allowed with an explicit rule.
05-18-2013 05:33 AM
So that means, if there are dependencies:
1.) It will resolve them automatically and add the needed services, invisible to the user.
2.) Because of that, I don't what what I actually allow through my firewall.
Excuse my ignorance, but are you guys serious?
05-18-2013 06:48 AM
I quote what is reported in PANOS v.5 release note:
Application Dependency Enhancement – For some protocols, you can allow an application in security policy without explicitly allowing its underlying protocol. This support is available if the application can be identified within a pre-determined point in the session, and has a dependency on any of the following applications: HTTP, SSL, MSRPC, RPC, t.120, RTSP, RTMP, and NETBIOS-SS. Custom applications based on HTTP, SSL, MS-RPC, or RTSP can also be allowed in security policy without explicitly allowing the underlying protocol. For example, if you want to allow Java software updates, which use HTTP (web-browsing), you no longer have to allow web-browsing. This feature will reduce the overall number of rules needed to manage policies.
This means that few applications can use this enchantment and you never allow unwanted applications. Be aware of how PA recognize application: for example application facebook relies on web-browsing because before facebook the frewall recognize in fact web-browsing app. So the programmer ask themself why not having an implicit application allowing?
Please do not mix together app and service (ports) these are different variables in security rules, as an advice try to use always application defaults as policy enforcement.
If you keep log option for security rule you are always able what traversed the firewall. Also always in session browser (cli/gui) you can see which kind of app traffic is flowing even with a permit all policy, this is the strength of these devices.
05-18-2013 07:30 AM
Is this the same cryptochrome from the infamous why "NSM is a piece of crap" forum? I happened to be the first one to reply to that post.
05-18-2013 09:40 AM
yep. that's the same Cryptochrome :smileygrin:
05-19-2013 01:49 PM
Slightly off-topic but I guess this is the thread you both are refering to ? 🙂
Want some examples why NSM is a piece of junk? - J-Net Community
05-19-2013 06:26 PM
Wow nice thread there I love that kind of candid, to the point feedback
05-20-2013 03:03 AM
I was really upset when I wrote that thread and I might have become too rude throughout the discussion, but I've had it with Juniper back then. Their NSM caused so much trouble it was unbelievable. Unfortunately, the same still holds true today. I just had a major crash on NSM two weeks ago from a failed DMI schema update. I love the SRX for it's concept and the beauty of Junos, but NSM is destroying that platform for me and a lot of my customers.
Anyways. This probably doesn't belong here.
05-20-2013 06:12 AM
Hey man, no need to apologize, sometimes my passion bubbles a little too close to the surface too
05-20-2013 06:39 AM
Back on topic... this is what my PA-500 just threw at me for the 'share-p2p' App-ID on PANOS 4.1.12:
VSYS1vsys1: Rule 'Allow all with threat' application dependency warning:
Application 'share-p2p' requires 'unknown-tcp' be allowed
(Module: device)
Configuration committed successfully
So yes, the original poster (cryptochrome) was correct in saying that for certain App-IDs, 'unknown-tcp' needs to be turned on. And I completely agree with him that "that's messed up" - I have to turn on 'unknown-tcp' for certain App-IDs to work? Say what?
05-20-2013 07:10 AM
Yep. That's what worries me too. In PanOS 5.0 these dependencies are automatically resolved (so you actually never see what the firewall is really opening up). says that it will never be unknown-tcp that would be resolved, but why did 4.x need unknown-tcp and 5.0 does not? Where is this documented? I find this really scary.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!