Application Override is a policy feature in PAN-OS that allows administrators to manually classify traffic based on Layer 4 information (protocol and port) and force the firewall to treat it as a specific, predefined application. When an Application Override policy matches traffic, it completely bypasses the standard App-ID inspection engine for that specific session.
Instead of discovering the application through signature matching, protocol decoding, and heuristics, the firewall simply labels the traffic with the application specified in the override rule. This is a powerful but potentially dangerous feature that should be used judiciously.
Core Concept: Application Override tells the firewall, "Stop trying to figure out what this traffic is based on its port/protocol; just *call it* Application X."
While App-ID is the preferred method for classification, Application Override has specific, limited use cases:
Often, creating a Custom Application Signature based on observed traffic patterns is a better alternative to Application Override for internal applications, as it still leverages the App-ID engine framework.
Policies > Application Override
Parameter | Description | Importance |
---|---|---|
Name | Descriptive name for the override rule. | High (for manageability) |
Tags/Description | Used for organization and explaining the rule's purpose (crucial for overrides). | High |
Source/Destination Zones | Defines the zones the traffic must traverse to match the rule. | High (Be specific!) |
Source/Destination Addresses | Defines the source/destination IP addresses or networks. | High (Be specific!) |
Protocol/Port |
The core matching criteria.
Specify the protocol (TCP/UDP) and the destination port number(s). Using
any
port is highly discouraged.
|
Critical |
Application | The target application. Select the App-ID the traffic should be *classified as*. This is the application name that will appear in logs and be used by subsequent policies (Security, QoS, etc.). | Critical |
# Example Rule Configuration (Conceptual) Rule Name: Override_CustomApp_TCP9999 Source Zone: Trust Destination Zone: DMZ Source Address: 10.1.1.0/24 Destination Address: 10.10.10.5/32 Protocol: TCP Destination Port: 9999 Application: custom-internal-app # The App-ID to force classification as
Using Application Override has significant consequences across various firewall features because it fundamentally changes how the traffic is identified:
App-ID Engine Bypassed:
Security Policy Matching:
Threat Prevention (Antivirus, Anti-Spyware, Vulnerability Protection):
URL Filtering:
File Blocking:
QoS (Quality of Service):
Logging and Reporting:
For the PCNSE exam, understand:
Policies > Application Override
.
1. What is the fundamental effect of an Application Override policy rule matching a traffic session?
2. When are Application Override rules evaluated relative to Security Policy rules?
3. What are the primary matching criteria used in an Application Override rule?
4. How does Application Override impact Threat Prevention (Antivirus, Anti-Spyware, Vulnerability Protection)?
5. Traffic on TCP port 5555 is overridden to be application `ssl`. A Security rule exists below the override rule that specifically DENIES application `my-custom-app`, which is the actual application running on TCP/5555. What will happen to this traffic?
6. Which is generally considered a safer alternative to Application Override for handling internal, proprietary applications?
7. An administrator creates an Application Override rule matching Destination Port `any`. What is the primary risk?
8. How will traffic classified by an Application Override rule appear in the Traffic logs?
9. Which is a recommended best practice when using Application Override?
10. Application Override policies are configured under which main tab in the PAN-OS GUI?