Manage: Application Override
Focus
Focus
Strata Cloud Manager

Manage: Application Override

Table of Contents

Manage: Application Override

Learn to manage application override policy rules.
Where Can I Use This?What Do I Need?
  • Prisma Access
    (with Strata Cloud Manager or Panorama configuration management)
  • NGFWs
    (with Strata Cloud Manager or Panorama configuration management)
  • At least one of these licenses is needed to manage your configuration with Strata Cloud Manager; for unified management of NGFWs and Prisma Access, you'll need both:
    • AIOps for NGFW Premium license (use the Strata Cloud Manager app)
  • (for VM-Series software NGFWs)
Create an application override policy to designate applications be processed using fast path Layer-4 inspection instead of using the App-ID for Layer-7 inspection. This forces the security enforcement node to handle the session as a regular stateful inspection and saves application processing times. You can create an application override policy rule when you do not want traffic inspection for custom applications between known IP addresses. For example, if you have a custom application on a non-standard port that you know users accessing the application are sanctioned, and both are in the Trust zone, you can override the application inspection requirements for the trusted users accessing the custom application.
To change how Prisma Access classifies applications, go to ManageConfigurationNGFW and Prisma AccessNetwork PoliciesApplication Override to then create your application override policy rule.

Application Override Tips

Consider that when you create an application override policy rule, you’re limiting App-ID from classifying your deployment's traffic and performing threat inspection based on that application identification. To support internal proprietary applications, it’s worth thinking about creating a custom application (instead of an application override rule) that include the application signature so that Strata Cloud Manager performs layer 7 inspection and scans the application traffic for threats. To create a custom application, go to ManageConfigurationNGFW and Prisma AccessObjectsApplications.

Application Override Policies

Use the following sections to configure an application override rule:
  • Source
    • ZonesAdd source zones.
    • AddressesAdd source addresses, address groups, or regions and specify the settings.
  • Destination
    • ZonesAdd to choose destination zones.
    • AddressesAdd source addresses, address groups, or regions and specify the settings.
  • Application
    • Application—Select the override application for traffic flows that match the above rule criteria. When overriding to a custom application, there is no threat inspection that is performed. The exception to this is when you override to a pre-defined application that supports threat inspection.
      To define new applications, go to ManageConfigurationNGFW and Prisma AccessObjectsApplications.
  • Protocol
    • Protocol—Select the protocol (TCP or UDP) for which to allow an application override.
    • Port—Enter the port number (0 to 65535) or range of port numbers (port1-port2) for the specified destination addresses. Multiple ports or ranges must be separated by commas.