Yoshua Gichara Eliazar - 00000051375 - IF673 - A - UTS
Yoshua Gichara Eliazar - 00000051375 - IF673 - A - UTS
4. APP ID
Multiple techniques to label traffic by application rather than just port. App-ID uses
multiple identification mechanisms to determine the exact identity of applications
traversing the firewall.
Accurate traffic classification is the primary function of any firewall, with the result
becoming the basis of the Security policy. Security rules within a Palo Alto Networks
firewall can specify applications to allow or block. Traditional firewalls classify traffic
by port and protocol, which at one point was a satisfactory mechanism for securing the
network perimeter. However, today’s applications can easily bypass a port-based firewall
by hopping ports, using SSL and SSH encrypted traffic, sneaking across port 80, or using
nonstandard ports. App-ID is the Palo Alto Networks traffic classification mechanism
that addresses the traffic classification limitations that plague traditional firewalls. In the
example, the port-based Security policy rule allows any traffic from the private zone to
the public zone as long as it is going to ports 20 and 21 (as defined in the service
service-ftp). The actual traffic might or might not be FTP traffic. The application-based
Security policy rule allows only FTP traffic from the private zone to the public zone that
is going to ports 20 and 21 (as defined by the service setting of application-default).
Palo Alto Networks App-ID uses four major technologies to help identify
applications:
▪ Known protocol decoders: A set of application decoders that understand the syntax
and commands of common applications
Network traffic is first classified based on its IP address and port. The firewall
consults the Security policy to determine if it should allow or block the traffic based on
IP address and port. During this initial Security policy check, the application is set to any.
If the traffic is allowed, then a session is created and App-ID then looks for an
application signature. The firewall uses its known protocol and unknown protocol
decoders to identify the application.
If App-ID determines that either SSL or SSH encryption is in use and a Decryption
policy is configured, the traffic flow could be decrypted and the unknown and known
protocol decoders could be applied to the decrypted traffic to detect an application
signature. If the traffic is not decrypted, then the traffic would be identified as the SSH or
SSL application. If an application signature cannot be identified, the traffic can be
labeled as unknown-tcp or unknown-udp. After an application has been identified, the
firewall checks the Security policy to determine whether to block, allow, or allow and
scan for threats.
IPS is similar to IDS, only IPS is also able to block potential threats. They monitor,
log and report activity, similar to an IDS, but they are also able to stop threats without
involving system administrators. If IPS is not set correctly, it can also reject legitimate
traffic, making it not suitable for all applications.
App-ID cannot identify the traffic from only a TCP syn packet. Even after the TCP
three-way handshake has completed, the firewall would report insufficient-data rather
than an application name. However, when an HTTP GET is detected, App-ID can report
the application as web-browsing. As more packets are received, App-ID might be able to
further classify the traffic. In the illustration, the traffic is further identified as
facebook-base and then facebook-chat.