{"id":117,"date":"2022-04-25T07:31:12","date_gmt":"2022-04-25T11:31:12","guid":{"rendered":"https:\/\/pressbooks.bccampus.ca\/paloalto\/?post_type=chapter&#038;p=117"},"modified":"2026-02-19T15:36:04","modified_gmt":"2026-02-19T20:36:04","slug":"work-with-applications","status":"publish","type":"chapter","link":"https:\/\/pressbooks.bccampus.ca\/paloalto\/chapter\/work-with-applications\/","title":{"raw":"2.1 Work with Applications","rendered":"2.1 Work with Applications"},"content":{"raw":"<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>Configure security policies<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox\">\r\n\r\n<strong>Prerequisites<\/strong>:\r\n<ul>\r\n \t<li>Knowledge of previous labs<\/li>\r\n \t<li>SNAT for internet access<\/li>\r\n \t<li>Security Policy from Inside to Outside<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: Employees can doze off and do other things that they're not supposed to do during work time. If only there was an easy application-aware next-generation firewall that can block these applications! (Hint: It's this firewall!) In this lab, we are going to add applications to the security policy to only allow specific traffic to pass through the firewall.<\/div>\r\n\r\n[caption id=\"attachment_190\" align=\"aligncenter\" width=\"987\"]<img class=\"wp-image-190 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-29-49-image.png\" alt=\"main scenario\" width=\"987\" height=\"506\" \/> Figure 2.1: Main scenario[\/caption]\r\n<table class=\"grid\" style=\"border-collapse: collapse;width: 100%;height: 92px\" border=\"0\"><caption>Table 2.1: Addressing Table<\/caption>\r\n<tbody>\r\n<tr style=\"height: 15px\">\r\n<th style=\"width: 50%;height: 15px\" scope=\"col\">Device<\/th>\r\n<th style=\"width: 50%;height: 15px\" scope=\"col\">Configuration<\/th>\r\n<\/tr>\r\n<tr style=\"height: 15px\">\r\n<td style=\"width: 50%;height: 15px\">Client (webterm)<\/td>\r\n<td style=\"width: 50%;height: 15px\">eth0: 10.0.0.2\/24 GW: 10.0.0.1<\/td>\r\n<\/tr>\r\n<tr style=\"height: 47px\">\r\n<td style=\"width: 50%;height: 47px\">PaloAlto<\/td>\r\n<td style=\"width: 50%;height: 47px\">Ethernet1\/1: 10.0.0.1\/24\r\nEthernet1\/2: DHCP\r\nManagement: 192.168.0.1\/24<\/td>\r\n<\/tr>\r\n<tr style=\"height: 15px\">\r\n<td style=\"width: 50%;height: 15px\">Management (webterm)<\/td>\r\n<td style=\"width: 50%;height: 15px\">eth0: 192.168.0.2\/24<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<table class=\"grid\" style=\"border-collapse: collapse;width: 100%\" border=\"0\"><caption>Table 2.2: Zone Configuration<\/caption>\r\n<tbody>\r\n<tr>\r\n<th style=\"width: 50%\" scope=\"col\">Zone<\/th>\r\n<th style=\"width: 50%\" scope=\"col\">Interface<\/th>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 50%\">Inside<\/td>\r\n<td style=\"width: 50%\">Ethernet1\/1<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 50%\">Outside<\/td>\r\n<td style=\"width: 50%\">Ethernet1\/2<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<h2>Modify Allowed Applications<\/h2>\r\nUnder<strong> polices &gt; security<\/strong>, create a new security policy that allows inside to outside.\r\n\r\n[caption id=\"attachment_384\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-384 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/Sec1.jpg\" alt=\"Create a security Policy\" width=\"1026\" height=\"830\" \/> Figure 2.2: Create a Security Policy[\/caption]\r\n\r\nUnder the application tab, add these under applications:\r\n<ul>\r\n \t<li>dns<\/li>\r\n \t<li>ssl<\/li>\r\n \t<li>web-browsing<\/li>\r\n \t<li>dns-over-https<\/li>\r\n<\/ul>\r\nThese will allow only basic web browsing.\r\n\r\n[caption id=\"attachment_192\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-192 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-46-30-image.png\" alt=\"Set a custom application\" width=\"1026\" height=\"830\" \/> Figure 2.3: Set a custom application[\/caption]\r\n\r\nPress <strong>OK<\/strong>, and commit the changes.\r\n<h2>Test the Policy<\/h2>\r\nOn the client machine, navigate to any website, and you'll see it works:\r\n\r\n[caption id=\"attachment_193\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-193 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-48-12-image.png\" alt=\"Verify your configuration\" width=\"1026\" height=\"830\" \/> Figure 2.4: Verify your configuration[\/caption]\r\n\r\nHowever, you'll notice that ping will not function:\r\n\r\n[caption id=\"attachment_194\" align=\"aligncenter\" width=\"1026\"]<img class=\"wp-image-194 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-49-45-image.png\" alt=\"Verify Ping\" width=\"1026\" height=\"830\" \/> Figure 2.5: Verify Ping[\/caption]\r\n\r\nYou can allow Ping application under application settings and then you can verify whether you are able to Ping or not.","rendered":"<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Configure security policies<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox\">\n<p><strong>Prerequisites<\/strong>:<\/p>\n<ul>\n<li>Knowledge of previous labs<\/li>\n<li>SNAT for internet access<\/li>\n<li>Security Policy from Inside to Outside<\/li>\n<\/ul>\n<\/div>\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: Employees can doze off and do other things that they&#8217;re not supposed to do during work time. If only there was an easy application-aware next-generation firewall that can block these applications! (Hint: It&#8217;s this firewall!) In this lab, we are going to add applications to the security policy to only allow specific traffic to pass through the firewall.<\/div>\n<figure id=\"attachment_190\" aria-describedby=\"caption-attachment-190\" style=\"width: 987px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-190 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-29-49-image.png\" alt=\"main scenario\" width=\"987\" height=\"506\" srcset=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-29-49-image.png 987w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-29-49-image-300x154.png 300w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-29-49-image-768x394.png 768w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-29-49-image-65x33.png 65w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-29-49-image-225x115.png 225w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-29-49-image-350x179.png 350w\" sizes=\"auto, (max-width: 987px) 100vw, 987px\" \/><figcaption id=\"caption-attachment-190\" class=\"wp-caption-text\">Figure 2.1: Main scenario<\/figcaption><\/figure>\n<table class=\"grid\" style=\"border-collapse: collapse;width: 100%;height: 92px\">\n<caption>Table 2.1: Addressing Table<\/caption>\n<tbody>\n<tr style=\"height: 15px\">\n<th style=\"width: 50%;height: 15px\" scope=\"col\">Device<\/th>\n<th style=\"width: 50%;height: 15px\" scope=\"col\">Configuration<\/th>\n<\/tr>\n<tr style=\"height: 15px\">\n<td style=\"width: 50%;height: 15px\">Client (webterm)<\/td>\n<td style=\"width: 50%;height: 15px\">eth0: 10.0.0.2\/24 GW: 10.0.0.1<\/td>\n<\/tr>\n<tr style=\"height: 47px\">\n<td style=\"width: 50%;height: 47px\">PaloAlto<\/td>\n<td style=\"width: 50%;height: 47px\">Ethernet1\/1: 10.0.0.1\/24<br \/>\nEthernet1\/2: DHCP<br \/>\nManagement: 192.168.0.1\/24<\/td>\n<\/tr>\n<tr style=\"height: 15px\">\n<td style=\"width: 50%;height: 15px\">Management (webterm)<\/td>\n<td style=\"width: 50%;height: 15px\">eth0: 192.168.0.2\/24<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table class=\"grid\" style=\"border-collapse: collapse;width: 100%\">\n<caption>Table 2.2: Zone Configuration<\/caption>\n<tbody>\n<tr>\n<th style=\"width: 50%\" scope=\"col\">Zone<\/th>\n<th style=\"width: 50%\" scope=\"col\">Interface<\/th>\n<\/tr>\n<tr>\n<td style=\"width: 50%\">Inside<\/td>\n<td style=\"width: 50%\">Ethernet1\/1<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%\">Outside<\/td>\n<td style=\"width: 50%\">Ethernet1\/2<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Modify Allowed Applications<\/h2>\n<p>Under<strong> polices &gt; security<\/strong>, create a new security policy that allows inside to outside.<\/p>\n<figure id=\"attachment_384\" aria-describedby=\"caption-attachment-384\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-384 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/Sec1.jpg\" alt=\"Create a security Policy\" width=\"1026\" height=\"830\" srcset=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/Sec1.jpg 1026w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/Sec1-300x243.jpg 300w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/Sec1-1024x828.jpg 1024w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/Sec1-768x621.jpg 768w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/Sec1-65x53.jpg 65w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/Sec1-225x182.jpg 225w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/Sec1-350x283.jpg 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-384\" class=\"wp-caption-text\">Figure 2.2: Create a Security Policy<\/figcaption><\/figure>\n<p>Under the application tab, add these under applications:<\/p>\n<ul>\n<li>dns<\/li>\n<li>ssl<\/li>\n<li>web-browsing<\/li>\n<li>dns-over-https<\/li>\n<\/ul>\n<p>These will allow only basic web browsing.<\/p>\n<figure id=\"attachment_192\" aria-describedby=\"caption-attachment-192\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-192 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-46-30-image.png\" alt=\"Set a custom application\" width=\"1026\" height=\"830\" srcset=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-46-30-image.png 1026w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-46-30-image-300x243.png 300w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-46-30-image-1024x828.png 1024w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-46-30-image-768x621.png 768w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-46-30-image-65x53.png 65w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-46-30-image-225x182.png 225w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-46-30-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-192\" class=\"wp-caption-text\">Figure 2.3: Set a custom application<\/figcaption><\/figure>\n<p>Press <strong>OK<\/strong>, and commit the changes.<\/p>\n<h2>Test the Policy<\/h2>\n<p>On the client machine, navigate to any website, and you&#8217;ll see it works:<\/p>\n<figure id=\"attachment_193\" aria-describedby=\"caption-attachment-193\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-193 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-48-12-image.png\" alt=\"Verify your configuration\" width=\"1026\" height=\"830\" srcset=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-48-12-image.png 1026w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-48-12-image-300x243.png 300w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-48-12-image-1024x828.png 1024w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-48-12-image-768x621.png 768w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-48-12-image-65x53.png 65w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-48-12-image-225x182.png 225w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-48-12-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-193\" class=\"wp-caption-text\">Figure 2.4: Verify your configuration<\/figcaption><\/figure>\n<p>However, you&#8217;ll notice that ping will not function:<\/p>\n<figure id=\"attachment_194\" aria-describedby=\"caption-attachment-194\" style=\"width: 1026px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-194 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-49-45-image.png\" alt=\"Verify Ping\" width=\"1026\" height=\"830\" srcset=\"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-49-45-image.png 1026w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-49-45-image-300x243.png 300w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-49-45-image-1024x828.png 1024w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-49-45-image-768x621.png 768w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-49-45-image-65x53.png 65w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-49-45-image-225x182.png 225w, https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-content\/uploads\/sites\/1640\/2022\/04\/2022-04-19-09-49-45-image-350x283.png 350w\" sizes=\"auto, (max-width: 1026px) 100vw, 1026px\" \/><figcaption id=\"caption-attachment-194\" class=\"wp-caption-text\">Figure 2.5: Verify Ping<\/figcaption><\/figure>\n<p>You can allow Ping application under application settings and then you can verify whether you are able to Ping or not.<\/p>\n","protected":false},"author":1572,"menu_order":1,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-117","chapter","type-chapter","status-publish","hentry"],"part":115,"_links":{"self":[{"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters\/117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/wp\/v2\/users\/1572"}],"version-history":[{"count":25,"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters\/117\/revisions"}],"predecessor-version":[{"id":1214,"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters\/117\/revisions\/1214"}],"part":[{"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/parts\/115"}],"metadata":[{"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapters\/117\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/wp\/v2\/media?parent=117"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/pressbooks\/v2\/chapter-type?post=117"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/wp\/v2\/contributor?post=117"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/paloalto\/wp-json\/wp\/v2\/license?post=117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}