Palo Alto Networks - Edu-210 Lab 4: App-ID: Document Version
Palo Alto Networks - Edu-210 Lab 4: App-ID: Document Version
Lab 4: App-ID
NETLAB Academy Edition, NETLAB Professional Edition, and NETLAB+ are registered trademarks of Network Development Group,
Inc.
VMware is a registered trademark of VMware, Inc. Cisco, IOS, Cisco IOS, Networking Academy, CCNA, and CCNP are registered
trademarks of Cisco Systems, Inc. EMC2 is a registered trademark of EMC Corporation.
Lab 4: App-ID
Contents
Introduction ........................................................................................................................ 3
Objectives............................................................................................................................ 3
Lab Topology ....................................................................................................................... 4
Lab Settings ......................................................................................................................... 5
4 Lab: App-ID.................................................................................................................. 6
4.1 Load Lab Configuration ........................................................................................ 6
4.2 Create App-ID Security Policy Rule ...................................................................... 7
4.3 Enable Interzone Logging ..................................................................................... 9
4.4 Enable the Application Block Page ..................................................................... 11
4.5 Test Application Blocking ................................................................................... 12
4.6 Review Logs ........................................................................................................ 13
4.7 Test Application Blocking ................................................................................... 14
4.8 Review Logs ........................................................................................................ 14
4.9 Modify the App-ID Security Policy Rule ............................................................. 16
4.10 Test App-ID Changes .......................................................................................... 17
4.11 Migrate Port-Based Rule to Application-Aware Rule ..................................... 17
4.12 Observe the Application Command Center.................................................... 19
Introduction
We have configured the interfaces and a basic security policy that allows any
application. Since this is a next-generation firewall we want to allow only the
applications that users need to complete their jobs. We will begin experimenting with
the application id process to see how we can restrict these applications.
Objectives
Lab Topology
Lab Settings
The information in the table below will be needed in order to complete the lab. The
task sections below provide details on the use of this information.
4 Lab: App-ID
4. Click Close.
5. Commit all changes.
Notice that the egress-public rule is now grayed out and in italic fonts:
Parameter Value
Name egress-outside-app-id
Parameter Value
Applications dns
facebook-base
ssl
web-browsing
2. Click the Actions tab. Note that Log at Session Start and Log at Session End are
deselected, and cannot be edited:
3. Click Cancel.
4. With the interzone-default policy rule selected but not opened, click Override.
7. Click OK.
Why could you browse to Facebook and MSN but not to Shutterfly? MSN
currently does not have an Application signature. Therefore, it falls under the
Application signature web-browsing. However, an Application signature exists
for Shutterfly and it is not currently allowed in any of the firewall Security policy
rules.
3. Browse to google.com and verify that google-base is also being blocked:
1. Try to work around the firewall’s denial of access to Shutterfly by using a web
proxy. In private/incognito mode in a browser, browse to avoidr.com.
2. Enter www.shutterfly.com in the text box near the bottom and click Go. An
application block page opens showing that the phproxy application was blocked:
2. Type ( app eq phproxy ) in the filter text box. The Traffic log entries
indicates that the phproxy application has been blocked:
Based on the information from your log, Shutterfly and phproxy are denied by
the interzone-default Security policy rule.
Note: The web-browsing Application signature only covers browsing that does
not match any other Application signature.
6. Click OK.
9. At the prompt for login information, enter the following (Credentials may be
cached from previous login):
Notice that the connection succeeds and that you can log in to the FTP server
with the updated Security policy rule.
The Application Command Center (ACC) is an analytical tool that provides actionable
intelligence on activity within your network. The ACC uses the firewall logs as the source
for graphically depicting traffic trends on your network. The graphical representation
enables you to interact with the data and visualize the relationships between events on
the network, including network use patterns, traffic patterns, and suspicious activity and
anomalies.
2. Note that the upper-right corner of the ACC displays the total risk level for all
traffic that has passed through the firewall thus far:
3. On the Network Activity tab, the Application Usage pane shows application
traffic generated so far (because log aggregation is required, 15 minutes might
pass before the ACC displays all applications).
4. You can click any application listed in the Application Usage pane; google-base is
used in this example:
Notice that the Application Usage pane updates to present only google-base
information.
Notice that the WebUI generated the appropriate log filter and jumped to the
applicable log information for the google-base application: