Application Override Protocol/Application Tab
Select the Protocol/Application tab to define the protocol (TCP or UDP), port, and application that further defines the attributes of the application for the policy match.
Select the protocol (TCP or UDP) for which to allow an application override.
Enter the port number (0 to 65535) or range of port numbers (port1-port2) for the specified destination addresses. Multiple ports or ranges must be separated by commas.
Select the override application for traffic flows that match the above rule criteria. When overriding to a custom application, there is no threat inspection that is performed. The exception to this is when you override to a pre-defined application that supports threat inspection.
To define new applications, refer to Objects > Applications).
Policies > Application Override
Policies > Application Override To change how the firewall classifies network traffic into applications, you can specify application override policies. For example, if you want ...
Defining Applications Select Objects Applications to Add a new custom application for the firewall to evaluate when applying policies. New Application Settings Description Configuration Tab ...
Objects > Services
Objects > Services When you define security policies for specific applications, you can select one or more services to limit the port numbers the applications ...
Manage Custom or Unknown Applications
Manage Custom or Unknown Applications Palo Alto Networks provides weekly application updates to identify new App-ID signatures. By default, App-ID is always enabled on the ...
Objects > Application Groups
Objects > Application Groups To simplify the creation of security policies, applications requiring the same security settings can be combined by creating an application group. ...
Disable the SIP Application-level Gateway (ALG)
Disable the SIP Application-level Gateway (ALG) The Palo Alto Networks firewall uses the Session Initiation Protocol (SIP) application-level gateway (ALG) to open dynamic pinholes in ...
Application Override Source Tab
Application Override Source Tab Select the Source tab to define the source zone or source address that defines the incoming source traffic to which the ...
Security Policy Overview
Security Policy Overview Security policies allow you to enforce rules and take action, and can be as general or specific as needed. The policy rules ...
Overriding or Reverting a Security Policy Rule
Overriding or Reverting a Security Policy Rule The default security rules—interzone-default and intrazone-default—have predefined settings that you can override on a firewall or on Panorama. ...