{"id":3396,"date":"2013-03-29T17:02:09","date_gmt":"2013-03-30T00:02:09","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=3396"},"modified":"2013-03-29T17:02:09","modified_gmt":"2013-03-30T00:02:09","slug":"update-on-the-app-id-cache-pollution-issue","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2013\/03\/update-on-the-app-id-cache-pollution-issue\/","title":{"rendered":"Update on the App-ID cache pollution issue"},"content":{"rendered":"<p><strong>March 2013 update:<\/strong>\u00a0I wanted give you all an update to the App-ID cache pollution issue that was discovered earlier this year. First off, we should have managed this issue more effectively \u2013 we learned from the experience and we will be customer-focused in our comments moving forward. As promised back in January, the App-ID cache function in PAN-OS is no longer used for security policy.<\/p>\n<ul>\n<li>PAN-OS 5.0.2 and subsequent releases posted to support site on or after January 15, 2013.<\/li>\n<li>PAN-OS 4.1.11 and subsequent releases posted to support site on or after February 6, 2013.<\/li>\n<\/ul>\n<p>We still recommend that you use the following security policy best-practices:<\/p>\n<ul>\n<li>For applications that you are enabling, you should assign a specific port (default or custom).<\/li>\n<li>For applications that you explicitly want to block, expand the policy to any port, to maximize the identification footprint.<\/li>\n<\/ul>\n<p>For any further updates, please work with your local Palo Alto Networks sales team and channel partner.<\/p>\n<p>Nir<\/p>\n","protected":false},"excerpt":{"rendered":"<p>March 2013 update:\u00a0I wanted give you all an update to the App-ID cache pollution issue that was discovered earlier this year. First off, we should have managed this issue more effectively \u2013 &hellip;<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"coauthors":[],"class_list":["post-3396","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3396"}],"version-history":[{"count":1,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3396\/revisions"}],"predecessor-version":[{"id":3397,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3396\/revisions\/3397"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3396"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=3396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}