: Defining Applications
Focus
Focus

Defining Applications

Table of Contents

Defining Applications

Select
Objects
Applications
to
Add
a new custom application for the firewall to evaluate when applying policies.
New Application Settings
Description
Configuration Tab
Name
Enter the application name (up to 31 characters). This name appears in the applications list when defining security policies. The name is case-sensitive and must be unique. Use only letters, numbers, spaces, periods, hyphens, and underscores. The first character must be a letter.
Shared
Select this option if you want the application to be available to:
  • Every virtual system (vsys) on a multi-vsys firewall. If you clear this selection, the application will be available only to the
    Virtual System
    selected in the
    Objects
    tab.
  • Every device group on Panorama. If you clear this selection, the application will be available only to the
    Device Group
    selected in the
    Objects
    tab.
Disable override (
Panorama only
)
Select this option to prevent administrators from overriding the settings of this application object in device groups that inherit the object. This selection is cleared by default, which means administrators can override the settings for any device group that inherits the object.
Description
Enter a description of the application for general reference (up to 255 characters).
Category
Select the application category, such as
email
or
database
. The category is used to generate the Top Ten Application Categories chart and is available for filtering (refer to ACC).
Subcategory
Select the application subcategory, such as
email
or
database
. The subcategory is used to generate the Top Ten Application Categories chart and is available for filtering (refer to ACC).
Technology
Select the technology for the application. By default, the Technology column is not displayed.
Show Technology Column
to select technologies to add to your application filter.
Parent App
Specify a parent application for this application. This setting applies when a session matches both the parent and the custom applications; however, the custom application is reported because it is more specific.
Risk
Select the risk level associated with this application (1=lowest to 5=highest).
Characteristics
Select the application characteristics that may place the application at risk. For a description of each characteristic, refer to Characteristics.
Advanced Tab
Port
If the protocol used by the application is TCP and/or UDP, select
Port
and enter one or more combinations of the protocol and port number (one entry per line). The general format is:
where the <port> is a single port number, or
dynamic
for dynamic port assignment.
Examples: TCP/dynamic or UDP/32.
This setting applies when using
app-default
in the Service column of a Security rule.
IP Protocol
To specify an IP protocol other than TCP or UDP, select
IP Protocol
, and enter the protocol number (1 to 255).
ICMP Type
To specify an Internet Control Message Protocol version 4 (ICMP) type, select
ICMP Type
and enter the type number (range is 0-255).
ICMP6 Type
To specify an Internet Control Message Protocol version 6 (ICMPv6) type, select
ICMP6 Type
and enter the type number (range is 0-255).
None
To specify signatures independent of protocol, select
None
.
Timeout
Enter the number of seconds before an idle application flow is terminated (range is 0-604800 seconds). A zero indicates that the default timeout of the application will be used. This value is used for protocols other than TCP and UDP in all cases and for TCP and UDP timeouts when the TCP timeout and UDP timeout are not specified.
TCP Timeout
Enter the number of seconds before an idle TCP application flow is terminated (range is 0-604800 seconds). A zero indicates that the default timeout of the application will be used.
UDP Timeout
Enter the number of seconds before an idle UDP application flow is terminated (range is 0-604800 seconds). A zero indicates that the default timeout of the application will be used.
TCP Half Closed
Enter the maximum length of time that a session remains in the session table, between receiving the first FIN and receiving the second FIN or RST. If the timer expires, the session is closed.
Default: If this timer is not configured at the application level, the global setting is used (range is 1-604800 seconds).
If this value is configured at the application level, it overrides the global TCP Half Closed setting.
TCP Time Wait
Enter the maximum length of time that a session remains in the session table after receiving the second FIN or a RST. If the timer expires, the session is closed.
Default: If this timer is not configured at the application level, the global setting is used (range is 1-600 seconds).
If this value is configured at the application level, it overrides the global TCP Time Wait setting.
Scanning
Select the scanning types that you want to allow based on Security Profiles (file types, data patterns, and viruses).
Signatures Tab
Signatures
Click
Add
to add a new signature, and specify the following information:
  • Signature Name
    —Enter a name to identify the signature.
  • Comment
    —Enter an optional description.
  • Ordered Condition Match
    —Select if the order in which signature conditions are defined is important.
  • Scope
    —Select whether to apply this signature only to the current
    Transaction
    or to the full user
    Session
    .
Specify the conditions that identify the signature. These conditions are used to generate the signature that the firewall uses to match the application patterns and control traffic:
  • To add a condition, select
    Add And Condition
    or
    Add Or Condition
    . To add a condition within a group, select the group and then click
    Add Condition
    .
  • Select an
    Operator
    from the drop-down. The options are
    Pattern Match
    ,
    Greater Than
    ,
    Less Than
    , and
    Equal To
    and specify the following options:
    (
    For Pattern Match only
    )
    • Context
      —Select from the available contexts. These contexts are updated using dynamic content updates.
    • Pattern
      — Specify a regular expression to specify unique string context values that apply to the custom application.
      Perform a packet capture to identify the context. See Pattern Rules Syntax for pattern rules for regular expressions.
    (
    For Greater Than, Less Than
    )
    • Context
      —Select from the available contexts. These contexts are updated using dynamic content updates
    • Value
      —Specify a value to match on (range is 0-4294967295).
    • Qualifier and Value
      —(
      Optional
      ) Add qualifier/value pairs.
    (
    For Equal To only
    )
    • Context
      —Select from unknown requests and responses for TCP or UDP (for example, unknown-req-tcp) or additional contexts that are available through dynamic content updates (for example, dnp3-req-func-code).
      For unknown requests and responses for TCP or UDP, specify
    • Position
      —Select between the first four or second four bytes in the payload.
    • Mask
      —Specify a 4-byte hex value, for example, 0xffffff00.
    • Value
      —Specify a 4-byte hex value, for example, 0xaabbccdd.
    For all other contexts, specify a
    Value
    that is pertinent to the application.
To move a condition within a group, select the condition and
Move Up
or
Move Down
. To move a group, select the group and
Move Up
or
Move Down
. You cannot move conditions from one group to another.
It is not required to specify signatures for the application if the application is used only for application override rules.

Recommended For You