

Port 80 Open BitTorrent Client Port 6681 Blocked © 2010 Palo Alto Networks. The net result is that the destination port of any given connection has no bearing on the service or application that is generating the traffic. There are a number of application proxies out there that will take well-behaved, fixed-port applications and tunnel them through any port the user wants. It is a simple procedure to force BitTorrent to use a common port like 80 instead. The BitTorrent client traditionally uses a port of 6681 or greater. Other applications can be configured by the user to be evasive by using a non-standard port. These applications are known as “evasive applications.” In a traditional firewall, Yahoo messenger is defined as any TCP traffic destined for port In reality, if port 5050 is blocked, Yahoo messenger can automatically try other common ports, including port 80. PingFU - Proxy One category of applications that are difficult to track and control are those applications that change port as needed.

Proprietary and Confidential.Ĥ Evasive Applications FIREWALL Port 5050 Blocked Yahoo Messenger The gateway at the trust border is the right place to enforce policy control Sees all traffic Defines trust boundary BUT…applications have changed Ports ≠ Applications IP Addresses ≠ Users Packets ≠ Content Need to restore visibility and control in the firewall © 2011 Palo Alto Networks. Palo Alto Networks is the Network Security Company World-class team with strong security and networking experience Founded in 2005 by security visionary Nir Zuk Top-tier investors Builds next-generation firewalls that identify / control applications Restores the firewall as the core of the enterprise network security infrastructure Innovations: App-ID™, User-ID™, Content-ID™ Global footprint: 3,500+ customers in 50+ countries, 24/7 supportģ Applications Have Changed Firewalls Have Not

1 Markus Laaksonen About Palo Alto Networks
