Modern applications rarely operate in isolation. They often rely on other underlying applications or services to function correctly. For example, a web application needs DNS to resolve hostnames and typically uses SSL/TLS for secure communication. Palo Alto Networks App-ID technology is designed to understand many of these relationships, known as Application Dependencies .
Understanding how PAN-OS identifies and handles these dependencies is crucial for creating accurate and effective Security Policies. If dependencies are not correctly accounted for, users might find that applications allowed by policy still fail to work because a required underlying service is being blocked.
PAN-OS categorizes dependencies primarily into two types:
dns
: Needed for resolving domain names used by almost all internet applications.
ssl
/
tls
: Used for establishing secure connections before the actual application data is exchanged (e.g., HTTPS uses SSL/TLS).
stun
: Often used for NAT traversal by real-time communication apps.
google-base
) with the Service set to
application-default
, the firewall
implicitly allows the necessary standard dependencies
like DNS lookups and the initial SSL/TLS handshake *for that specific session*. It recognizes these are required for the allowed application to function.
ms-office365-base
might explicitly depend on
ms-office365-online
or other specific Office 365 services.
facebook-apps
might explicitly depend on
facebook-base
.
Objects > Applications > [Select Application]
or on the
Applipedia
website.
application-default
, you
do not need separate Security Policy rules
to explicitly allow standard implicit dependencies like
dns
or
ssl
*for those application sessions*. The firewall handles it.
application-default
in the Service column. This setting allows the firewall to expect standard behavior, including the use of standard ports for dependencies.
dns
or
ssl
from the source zone or for the user, those blocking rules might still prevent the application from working.
Outbound policies for core services need careful consideration.
dns
,
ssl
, or other explicitly listed dependencies.
Objects > Applications
) to identify any explicitly listed dependencies. Ensure these are not being blocked by other rules.
While not its primary function, the
Policy Optimizer
(
Policies > Policy Optimizer
) can offer clues about dependencies:
ssl
,
dns
, or other specific helper applications) listed under "Apps Seen". This doesn't necessarily mean the dependency was blocked (it might have been implicitly allowed), but it confirms its presence in the traffic flow associated with that rule.
Policy Optimizer is more a tool for rule refinement and identifying traffic composition than a dedicated dependency analysis tool, but its "Apps Seen" data provides valuable context.
For the PCNSE exam, concerning App-ID dependencies:
1. What is considered an 'Implicit Dependency' in PAN-OS App-ID?
2. How does the firewall typically handle implicit dependencies like DNS when a Security rule allows a parent application (e.g., `web-browsing`) with Service set to `application-default`?
3. Where can an administrator find the list of 'Explicit Dependencies' for a standard Palo Alto Networks App-ID?
4. What is the recommended 'Service' setting in a Security Policy rule to best facilitate automatic handling of application dependencies?
5. A user reports that Salesforce (allowed by App-ID `salesforce-base` with `application-default`) is not working. Logs show `dns` traffic from the user's zone being denied by a lower rule. What is the likely issue?
6. When might you need an explicit Security rule to allow `ssl` or `tls`?
7. How does enabling SSL/TLS Decryption help with identifying application dependencies?
8. How can the Policy Optimizer tool assist with understanding application dependencies?
9. An administrator allows a custom internal application using App-ID `internal-app-X` on service `tcp-9000`. Users report it doesn't work. What dependency issue might be occurring?
10. Which is a common "gotcha" related to App-ID dependencies?