{"id":1212,"date":"2021-08-18T15:58:40","date_gmt":"2021-08-18T20:58:40","guid":{"rendered":"https:\/\/zewwy.ca\/?p=1212"},"modified":"2021-08-18T15:58:40","modified_gmt":"2021-08-18T20:58:40","slug":"palo-alto-networks-protocols-defined","status":"publish","type":"post","link":"https:\/\/zewwy.ca\/index.php\/2021\/08\/18\/palo-alto-networks-protocols-defined\/","title":{"rendered":"Palo Alto Networks Protocols Defined"},"content":{"rendered":"<p>I have to often <a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA10g000000ClQSCA0\">do validation on rules set created on a Palo Alto firewall<\/a>, now if you&#8217;ve done this you&#8217;ll know there&#8217;s\u00a0 a specific requirement to define which protocol to test against. Generally you&#8217;ll use UDP or TCP, and ICMP if needing to validate ping rules.<\/p>\n<p>However PAN uses numbers and the provided direct KB from them does not define them all (1-255). So googling I found a nice simplified post by Kerry Cordero on <a href=\"https:\/\/cordero.me\/palo-alto-test-policy-matches\/\">his site here<\/a>. Where he got this info from I&#8217;m not certain, he did not reference any PAN KB&#8217;s or anything. For prosperity of the internet I have quotes his list as it was on his site.<\/p>\n<p>Many Thanks to Kerry for this work on this.<\/p>\n<p>&#8220;<strong>Protocol Options:<\/strong><br \/>\nWhen it comes to the protocol #, you have several options to choose from like:<\/p>\n<p>TCP = 6<br \/>\nUDP = 17<br \/>\nICMP = 1<br \/>\nESP = 50<\/p>\n<p>Below is a full list of options you can use.<\/p>\n<table width=\"922\">\n<tbody>\n<tr>\n<td width=\"57\">Decimal<\/td>\n<td width=\"135\">Keyword<\/td>\n<td width=\"263\">Protocol<\/td>\n<td width=\"147\">IPv6 Extension Header<\/td>\n<td width=\"320\">Reference<\/td>\n<\/tr>\n<tr>\n<td>0<\/td>\n<td>HOPOPT<\/td>\n<td>IPv6 Hop-by-Hop Option<\/td>\n<td>Y<\/td>\n<td>[RFC8200]<\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>ICMP<\/td>\n<td>Internet Control Message<\/td>\n<td><\/td>\n<td>[RFC792]<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>IGMP<\/td>\n<td>Internet Group Management<\/td>\n<td><\/td>\n<td>[RFC1112]<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>GGP<\/td>\n<td>Gateway-to-Gateway<\/td>\n<td><\/td>\n<td>[RFC823]<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>IPv4<\/td>\n<td>IPv4 encapsulation<\/td>\n<td><\/td>\n<td>[RFC2003]<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>ST<\/td>\n<td>Stream<\/td>\n<td><\/td>\n<td>[RFC1190][RFC1819]<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td>TCP<\/td>\n<td>Transmission Control<\/td>\n<td><\/td>\n<td>[RFC793]<\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td>CBT<\/td>\n<td>CBT<\/td>\n<td><\/td>\n<td>[Tony_Ballardie]<\/td>\n<\/tr>\n<tr>\n<td>8<\/td>\n<td>EGP<\/td>\n<td>Exterior Gateway Protocol<\/td>\n<td><\/td>\n<td>[RFC888][David_Mills]<\/td>\n<\/tr>\n<tr>\n<td>9<\/td>\n<td>IGP<\/td>\n<td width=\"263\">any private interior gateway<br \/>\n(used by Cisco for their IGRP)<\/td>\n<td><\/td>\n<td>[Internet_Assigned_Numbers_Authority]<\/td>\n<\/tr>\n<tr>\n<td>10<\/td>\n<td>BBN-RCC-MON<\/td>\n<td>BBN RCC Monitoring<\/td>\n<td><\/td>\n<td>[Steve_Chipman]<\/td>\n<\/tr>\n<tr>\n<td>11<\/td>\n<td>NVP-II<\/td>\n<td>Network Voice Protocol<\/td>\n<td><\/td>\n<td>[RFC741][Steve_Casner]<\/td>\n<\/tr>\n<tr>\n<td>12<\/td>\n<td>PUP<\/td>\n<td>PUP<\/td>\n<td><\/td>\n<td width=\"320\">[Boggs, D., J. Shoch, E. Taft, and R. Metcalfe, \u201cPUP: An<br \/>\nInternetwork Architecture\u201d, XEROX Palo Alto Research Center,<br \/>\nCSL-79-10, July 1979; also in IEEE Transactions on<br \/>\nCommunication, Volume COM-28, Number 4, April 1980.][[XEROX]]<\/td>\n<\/tr>\n<tr>\n<td>13<\/td>\n<td>ARGUS (deprecated)<\/td>\n<td>ARGUS<\/td>\n<td><\/td>\n<td>[Robert_W_Scheifler]<\/td>\n<\/tr>\n<tr>\n<td>14<\/td>\n<td>EMCON<\/td>\n<td>EMCON<\/td>\n<td><\/td>\n<td>[&lt;mystery contact&gt;]<\/td>\n<\/tr>\n<tr>\n<td>15<\/td>\n<td>XNET<\/td>\n<td>Cross Net Debugger<\/td>\n<td><\/td>\n<td width=\"320\">[Haverty, J., \u201cXNET Formats for Internet Protocol Version 4\u201d,<br \/>\nIEN 158, October 1980.][Jack_Haverty]<\/td>\n<\/tr>\n<tr>\n<td>16<\/td>\n<td>CHAOS<\/td>\n<td>Chaos<\/td>\n<td><\/td>\n<td>[J_Noel_Chiappa]<\/td>\n<\/tr>\n<tr>\n<td>17<\/td>\n<td>UDP<\/td>\n<td>User Datagram<\/td>\n<td><\/td>\n<td>[RFC768][Jon_Postel]<\/td>\n<\/tr>\n<tr>\n<td>18<\/td>\n<td>MUX<\/td>\n<td>Multiplexing<\/td>\n<td><\/td>\n<td width=\"320\">[Cohen, D. and J. Postel, \u201cMultiplexing Protocol\u201d, IEN 90,<br \/>\nUSC\/Information Sciences Institute, May 1979.][Jon_Postel]<\/td>\n<\/tr>\n<tr>\n<td>19<\/td>\n<td>DCN-MEAS<\/td>\n<td>DCN Measurement Subsystems<\/td>\n<td><\/td>\n<td>[David_Mills]<\/td>\n<\/tr>\n<tr>\n<td>20<\/td>\n<td>HMP<\/td>\n<td>Host Monitoring<\/td>\n<td><\/td>\n<td>[RFC869][Bob_Hinden]<\/td>\n<\/tr>\n<tr>\n<td>21<\/td>\n<td>PRM<\/td>\n<td>Packet Radio Measurement<\/td>\n<td><\/td>\n<td>[Zaw_Sing_Su]<\/td>\n<\/tr>\n<tr>\n<td>22<\/td>\n<td>XNS-IDP<\/td>\n<td>XEROX NS IDP<\/td>\n<td><\/td>\n<td width=\"320\">[\u201cThe Ethernet, A Local Area Network: Data Link Layer and<br \/>\nPhysical Layer Specification\u201d, AA-K759B-TK, Digital<br \/>\nEquipment Corporation, Maynard, MA.\u00a0 Also as: \u201cThe<br \/>\nEthernet \u2013 A Local Area Network\u201d, Version 1.0, Digital<br \/>\nEquipment Corporation, Intel Corporation, Xerox<br \/>\nCorporation, September 1980.\u00a0 And: \u201cThe Ethernet, A Local<br \/>\nArea Network: Data Link Layer and Physical Layer<br \/>\nSpecifications\u201d, Digital, Intel and Xerox, November 1982.<br \/>\nAnd: XEROX, \u201cThe Ethernet, A Local Area Network: Data Link<br \/>\nLayer and Physical Layer Specification\u201d, X3T51\/80-50,<br \/>\nXerox Corporation, Stamford, CT., October 1980.][[XEROX]]<\/td>\n<\/tr>\n<tr>\n<td>23<\/td>\n<td>TRUNK-1<\/td>\n<td>Trunk-1<\/td>\n<td><\/td>\n<td>[Barry_Boehm]<\/td>\n<\/tr>\n<tr>\n<td>24<\/td>\n<td>TRUNK-2<\/td>\n<td>Trunk-2<\/td>\n<td><\/td>\n<td>[Barry_Boehm]<\/td>\n<\/tr>\n<tr>\n<td>25<\/td>\n<td>LEAF-1<\/td>\n<td>Leaf-1<\/td>\n<td><\/td>\n<td>[Barry_Boehm]<\/td>\n<\/tr>\n<tr>\n<td>26<\/td>\n<td>LEAF-2<\/td>\n<td>Leaf-2<\/td>\n<td><\/td>\n<td>[Barry_Boehm]<\/td>\n<\/tr>\n<tr>\n<td>27<\/td>\n<td>RDP<\/td>\n<td>Reliable Data Protocol<\/td>\n<td><\/td>\n<td>[RFC908][Bob_Hinden]<\/td>\n<\/tr>\n<tr>\n<td>28<\/td>\n<td>IRTP<\/td>\n<td>Internet Reliable Transaction<\/td>\n<td><\/td>\n<td>[RFC938][Trudy_Miller]<\/td>\n<\/tr>\n<tr>\n<td>29<\/td>\n<td>ISO-TP4<\/td>\n<td>ISO Transport Protocol Class 4<\/td>\n<td><\/td>\n<td>[RFC905][&lt;mystery contact&gt;]<\/td>\n<\/tr>\n<tr>\n<td>30<\/td>\n<td>NETBLT<\/td>\n<td>Bulk Data Transfer Protocol<\/td>\n<td><\/td>\n<td>[RFC969][David_Clark]<\/td>\n<\/tr>\n<tr>\n<td>31<\/td>\n<td>MFE-NSP<\/td>\n<td>MFE Network Services Protocol<\/td>\n<td><\/td>\n<td width=\"320\">[Shuttleworth, B., \u201cA Documentary of MFENet, a National<br \/>\nComputer Network\u201d, UCRL-52317, Lawrence Livermore Labs,<br \/>\nLivermore, California, June 1977.][Barry_Howard]<\/td>\n<\/tr>\n<tr>\n<td>32<\/td>\n<td>MERIT-INP<\/td>\n<td>MERIT Internodal Protocol<\/td>\n<td><\/td>\n<td>[Hans_Werner_Braun]<\/td>\n<\/tr>\n<tr>\n<td>33<\/td>\n<td>DCCP<\/td>\n<td>Datagram Congestion Control Protocol<\/td>\n<td><\/td>\n<td>[RFC4340]<\/td>\n<\/tr>\n<tr>\n<td>34<\/td>\n<td>3PC<\/td>\n<td>Third Party Connect Protocol<\/td>\n<td><\/td>\n<td>[Stuart_A_Friedberg]<\/td>\n<\/tr>\n<tr>\n<td>35<\/td>\n<td>IDPR<\/td>\n<td>Inter-Domain Policy Routing Protocol<\/td>\n<td><\/td>\n<td>[Martha_Steenstrup]<\/td>\n<\/tr>\n<tr>\n<td>36<\/td>\n<td>XTP<\/td>\n<td>XTP<\/td>\n<td><\/td>\n<td>[Greg_Chesson]<\/td>\n<\/tr>\n<tr>\n<td>37<\/td>\n<td>DDP<\/td>\n<td>Datagram Delivery Protocol<\/td>\n<td><\/td>\n<td>[Wesley_Craig]<\/td>\n<\/tr>\n<tr>\n<td>38<\/td>\n<td>IDPR-CMTP<\/td>\n<td>IDPR Control Message Transport Proto<\/td>\n<td><\/td>\n<td>[Martha_Steenstrup]<\/td>\n<\/tr>\n<tr>\n<td>39<\/td>\n<td>TP++<\/td>\n<td>TP++ Transport Protocol<\/td>\n<td><\/td>\n<td>[Dirk_Fromhein]<\/td>\n<\/tr>\n<tr>\n<td>40<\/td>\n<td>IL<\/td>\n<td>IL Transport Protocol<\/td>\n<td><\/td>\n<td>[Dave_Presotto]<\/td>\n<\/tr>\n<tr>\n<td>41<\/td>\n<td>IPv6<\/td>\n<td>IPv6 encapsulation<\/td>\n<td><\/td>\n<td>[RFC2473]<\/td>\n<\/tr>\n<tr>\n<td>42<\/td>\n<td>SDRP<\/td>\n<td>Source Demand Routing Protocol<\/td>\n<td><\/td>\n<td>[Deborah_Estrin]<\/td>\n<\/tr>\n<tr>\n<td>43<\/td>\n<td>IPv6-Route<\/td>\n<td>Routing Header for IPv6<\/td>\n<td>Y<\/td>\n<td>[Steve_Deering]<\/td>\n<\/tr>\n<tr>\n<td>44<\/td>\n<td>IPv6-Frag<\/td>\n<td>Fragment Header for IPv6<\/td>\n<td>Y<\/td>\n<td>[Steve_Deering]<\/td>\n<\/tr>\n<tr>\n<td>45<\/td>\n<td>IDRP<\/td>\n<td>Inter-Domain Routing Protocol<\/td>\n<td><\/td>\n<td>[Sue_Hares]<\/td>\n<\/tr>\n<tr>\n<td>46<\/td>\n<td>RSVP<\/td>\n<td>Reservation Protocol<\/td>\n<td><\/td>\n<td>[RFC2205][RFC3209][Bob_Braden]<\/td>\n<\/tr>\n<tr>\n<td>47<\/td>\n<td>GRE<\/td>\n<td>Generic Routing Encapsulation<\/td>\n<td><\/td>\n<td>[RFC2784][Tony_Li]<\/td>\n<\/tr>\n<tr>\n<td>48<\/td>\n<td>DSR<\/td>\n<td>Dynamic Source Routing Protocol<\/td>\n<td><\/td>\n<td>[RFC4728]<\/td>\n<\/tr>\n<tr>\n<td>49<\/td>\n<td>BNA<\/td>\n<td>BNA<\/td>\n<td><\/td>\n<td>[Gary Salamon]<\/td>\n<\/tr>\n<tr>\n<td>50<\/td>\n<td>ESP<\/td>\n<td>Encap Security Payload<\/td>\n<td>Y<\/td>\n<td>[RFC4303]<\/td>\n<\/tr>\n<tr>\n<td>51<\/td>\n<td>AH<\/td>\n<td>Authentication Header<\/td>\n<td>Y<\/td>\n<td>[RFC4302]<\/td>\n<\/tr>\n<tr>\n<td>52<\/td>\n<td>I-NLSP<\/td>\n<td>Integrated Net Layer Security\u00a0 TUBA<\/td>\n<td><\/td>\n<td>[K_Robert_Glenn]<\/td>\n<\/tr>\n<tr>\n<td>53<\/td>\n<td>SWIPE (deprecated)<\/td>\n<td>IP with Encryption<\/td>\n<td><\/td>\n<td>[John_Ioannidis]<\/td>\n<\/tr>\n<tr>\n<td>54<\/td>\n<td>NARP<\/td>\n<td>NBMA Address Resolution Protocol<\/td>\n<td><\/td>\n<td>[RFC1735]<\/td>\n<\/tr>\n<tr>\n<td>55<\/td>\n<td>MOBILE<\/td>\n<td>IP Mobility<\/td>\n<td><\/td>\n<td>[Charlie_Perkins]<\/td>\n<\/tr>\n<tr>\n<td>56<\/td>\n<td>TLSP<\/td>\n<td width=\"263\">Transport Layer Security Protocol<br \/>\nusing Kryptonet key management<\/td>\n<td><\/td>\n<td>[Christer_Oberg]<\/td>\n<\/tr>\n<tr>\n<td>57<\/td>\n<td>SKIP<\/td>\n<td>SKIP<\/td>\n<td><\/td>\n<td>[Tom_Markson]<\/td>\n<\/tr>\n<tr>\n<td>58<\/td>\n<td>IPv6-ICMP<\/td>\n<td>ICMP for IPv6<\/td>\n<td><\/td>\n<td>[RFC8200]<\/td>\n<\/tr>\n<tr>\n<td>59<\/td>\n<td>IPv6-NoNxt<\/td>\n<td>No Next Header for IPv6<\/td>\n<td><\/td>\n<td>[RFC8200]<\/td>\n<\/tr>\n<tr>\n<td>60<\/td>\n<td>IPv6-Opts<\/td>\n<td>Destination Options for IPv6<\/td>\n<td>Y<\/td>\n<td>[RFC8200]<\/td>\n<\/tr>\n<tr>\n<td>61<\/td>\n<td><\/td>\n<td>any host internal protocol<\/td>\n<td><\/td>\n<td>[Internet_Assigned_Numbers_Authority]<\/td>\n<\/tr>\n<tr>\n<td>62<\/td>\n<td>CFTP<\/td>\n<td>CFTP<\/td>\n<td><\/td>\n<td width=\"320\">[Forsdick, H., \u201cCFTP\u201d, Network Message, Bolt Beranek and<br \/>\nNewman, January 1982.][Harry_Forsdick]<\/td>\n<\/tr>\n<tr>\n<td>63<\/td>\n<td><\/td>\n<td>any local network<\/td>\n<td><\/td>\n<td>[Internet_Assigned_Numbers_Authority]<\/td>\n<\/tr>\n<tr>\n<td>64<\/td>\n<td>SAT-EXPAK<\/td>\n<td>SATNET and Backroom EXPAK<\/td>\n<td><\/td>\n<td>[Steven_Blumenthal]<\/td>\n<\/tr>\n<tr>\n<td>65<\/td>\n<td>KRYPTOLAN<\/td>\n<td>Kryptolan<\/td>\n<td><\/td>\n<td>[Paul Liu]<\/td>\n<\/tr>\n<tr>\n<td>66<\/td>\n<td>RVD<\/td>\n<td>MIT Remote Virtual Disk Protocol<\/td>\n<td><\/td>\n<td>[Michael_Greenwald]<\/td>\n<\/tr>\n<tr>\n<td>67<\/td>\n<td>IPPC<\/td>\n<td>Internet Pluribus Packet Core<\/td>\n<td><\/td>\n<td>[Steven_Blumenthal]<\/td>\n<\/tr>\n<tr>\n<td>68<\/td>\n<td><\/td>\n<td>any distributed file system<\/td>\n<td><\/td>\n<td>[Internet_Assigned_Numbers_Authority]<\/td>\n<\/tr>\n<tr>\n<td>69<\/td>\n<td>SAT-MON<\/td>\n<td>SATNET Monitoring<\/td>\n<td><\/td>\n<td>[Steven_Blumenthal]<\/td>\n<\/tr>\n<tr>\n<td>70<\/td>\n<td>VISA<\/td>\n<td>VISA Protocol<\/td>\n<td><\/td>\n<td>[Gene_Tsudik]<\/td>\n<\/tr>\n<tr>\n<td>71<\/td>\n<td>IPCV<\/td>\n<td>Internet Packet Core Utility<\/td>\n<td><\/td>\n<td>[Steven_Blumenthal]<\/td>\n<\/tr>\n<tr>\n<td>72<\/td>\n<td>CPNX<\/td>\n<td>Computer Protocol Network Executive<\/td>\n<td><\/td>\n<td>[David Mittnacht]<\/td>\n<\/tr>\n<tr>\n<td>73<\/td>\n<td>CPHB<\/td>\n<td>Computer Protocol Heart Beat<\/td>\n<td><\/td>\n<td>[David Mittnacht]<\/td>\n<\/tr>\n<tr>\n<td>74<\/td>\n<td>WSN<\/td>\n<td>Wang Span Network<\/td>\n<td><\/td>\n<td>[Victor Dafoulas]<\/td>\n<\/tr>\n<tr>\n<td>75<\/td>\n<td>PVP<\/td>\n<td>Packet Video Protocol<\/td>\n<td><\/td>\n<td>[Steve_Casner]<\/td>\n<\/tr>\n<tr>\n<td>76<\/td>\n<td>BR-SAT-MON<\/td>\n<td>Backroom SATNET Monitoring<\/td>\n<td><\/td>\n<td>[Steven_Blumenthal]<\/td>\n<\/tr>\n<tr>\n<td>77<\/td>\n<td>SUN-ND<\/td>\n<td>SUN ND PROTOCOL-Temporary<\/td>\n<td><\/td>\n<td>[William_Melohn]<\/td>\n<\/tr>\n<tr>\n<td>78<\/td>\n<td>WB-MON<\/td>\n<td>WIDEBAND Monitoring<\/td>\n<td><\/td>\n<td>[Steven_Blumenthal]<\/td>\n<\/tr>\n<tr>\n<td>79<\/td>\n<td>WB-EXPAK<\/td>\n<td>WIDEBAND EXPAK<\/td>\n<td><\/td>\n<td>[Steven_Blumenthal]<\/td>\n<\/tr>\n<tr>\n<td>80<\/td>\n<td>ISO-IP<\/td>\n<td>ISO Internet Protocol<\/td>\n<td><\/td>\n<td>[Marshall_T_Rose]<\/td>\n<\/tr>\n<tr>\n<td>81<\/td>\n<td>VMTP<\/td>\n<td>VMTP<\/td>\n<td><\/td>\n<td>[Dave_Cheriton]<\/td>\n<\/tr>\n<tr>\n<td>82<\/td>\n<td>SECURE-VMTP<\/td>\n<td>SECURE-VMTP<\/td>\n<td><\/td>\n<td>[Dave_Cheriton]<\/td>\n<\/tr>\n<tr>\n<td>83<\/td>\n<td>VINES<\/td>\n<td>VINES<\/td>\n<td><\/td>\n<td>[Brian Horn]<\/td>\n<\/tr>\n<tr>\n<td>84<\/td>\n<td>TTP<\/td>\n<td>Transaction Transport Protocol<\/td>\n<td><\/td>\n<td>[Jim_Stevens]<\/td>\n<\/tr>\n<tr>\n<td>84<\/td>\n<td>IPTM<\/td>\n<td>Internet Protocol Traffic Manager<\/td>\n<td><\/td>\n<td>[Jim_Stevens]<\/td>\n<\/tr>\n<tr>\n<td>85<\/td>\n<td>NSFNET-IGP<\/td>\n<td>NSFNET-IGP<\/td>\n<td><\/td>\n<td>[Hans_Werner_Braun]<\/td>\n<\/tr>\n<tr>\n<td>86<\/td>\n<td>DGP<\/td>\n<td>Dissimilar Gateway Protocol<\/td>\n<td><\/td>\n<td width=\"320\">[M\/A-COM Government Systems, \u201cDissimilar Gateway Protocol<br \/>\nSpecification, Draft Version\u201d, Contract no. CS901145,<br \/>\nNovember 16, 1987.][Mike_Little]<\/td>\n<\/tr>\n<tr>\n<td>87<\/td>\n<td>TCF<\/td>\n<td>TCF<\/td>\n<td><\/td>\n<td>[Guillermo_A_Loyola]<\/td>\n<\/tr>\n<tr>\n<td>88<\/td>\n<td>EIGRP<\/td>\n<td>EIGRP<\/td>\n<td><\/td>\n<td>[RFC7868]<\/td>\n<\/tr>\n<tr>\n<td>89<\/td>\n<td>OSPFIGP<\/td>\n<td>OSPFIGP<\/td>\n<td><\/td>\n<td>[RFC1583][RFC2328][RFC5340][John_Moy]<\/td>\n<\/tr>\n<tr>\n<td>90<\/td>\n<td>Sprite-RPC<\/td>\n<td>Sprite RPC Protocol<\/td>\n<td><\/td>\n<td width=\"320\">[Welch, B., \u201cThe Sprite Remote Procedure Call System\u201d,<br \/>\nTechnical Report, UCB\/Computer Science Dept., 86\/302,<br \/>\nUniversity of California at Berkeley, June 1986.][Bruce Willins]<\/td>\n<\/tr>\n<tr>\n<td>91<\/td>\n<td>LARP<\/td>\n<td>Locus Address Resolution Protocol<\/td>\n<td><\/td>\n<td>[Brian Horn]<\/td>\n<\/tr>\n<tr>\n<td>92<\/td>\n<td>MTP<\/td>\n<td>Multicast Transport Protocol<\/td>\n<td><\/td>\n<td>[Susie_Armstrong]<\/td>\n<\/tr>\n<tr>\n<td>93<\/td>\n<td>AX.25<\/td>\n<td>AX.25 Frames<\/td>\n<td><\/td>\n<td>[Brian_Kantor]<\/td>\n<\/tr>\n<tr>\n<td>94<\/td>\n<td>IPIP<\/td>\n<td>IP-within-IP Encapsulation Protocol<\/td>\n<td><\/td>\n<td>[John_Ioannidis]<\/td>\n<\/tr>\n<tr>\n<td>95<\/td>\n<td>MICP (deprecated)<\/td>\n<td>Mobile Internetworking Control Pro.<\/td>\n<td><\/td>\n<td>[John_Ioannidis]<\/td>\n<\/tr>\n<tr>\n<td>96<\/td>\n<td>SCC-SP<\/td>\n<td>Semaphore Communications Sec. Pro.<\/td>\n<td><\/td>\n<td>[Howard_Hart]<\/td>\n<\/tr>\n<tr>\n<td>97<\/td>\n<td>ETHERIP<\/td>\n<td>Ethernet-within-IP Encapsulation<\/td>\n<td><\/td>\n<td>[RFC3378]<\/td>\n<\/tr>\n<tr>\n<td>98<\/td>\n<td>ENCAP<\/td>\n<td>Encapsulation Header<\/td>\n<td><\/td>\n<td>[RFC1241][Robert_Woodburn]<\/td>\n<\/tr>\n<tr>\n<td>99<\/td>\n<td><\/td>\n<td>any private encryption scheme<\/td>\n<td><\/td>\n<td>[Internet_Assigned_Numbers_Authority]<\/td>\n<\/tr>\n<tr>\n<td>100<\/td>\n<td>GMTP<\/td>\n<td>GMTP<\/td>\n<td><\/td>\n<td>[[RXB5]]<\/td>\n<\/tr>\n<tr>\n<td>101<\/td>\n<td>IFMP<\/td>\n<td>Ipsilon Flow Management Protocol<\/td>\n<td><\/td>\n<td>[Bob_Hinden][November 1995, 1997.]<\/td>\n<\/tr>\n<tr>\n<td>102<\/td>\n<td>PNNI<\/td>\n<td>PNNI over IP<\/td>\n<td><\/td>\n<td>[Ross_Callon]<\/td>\n<\/tr>\n<tr>\n<td>103<\/td>\n<td>PIM<\/td>\n<td>Protocol Independent Multicast<\/td>\n<td><\/td>\n<td>[RFC7761][Dino_Farinacci]<\/td>\n<\/tr>\n<tr>\n<td>104<\/td>\n<td>ARIS<\/td>\n<td>ARIS<\/td>\n<td><\/td>\n<td>[Nancy_Feldman]<\/td>\n<\/tr>\n<tr>\n<td>105<\/td>\n<td>SCPS<\/td>\n<td>SCPS<\/td>\n<td><\/td>\n<td>[Robert_Durst]<\/td>\n<\/tr>\n<tr>\n<td>106<\/td>\n<td>QNX<\/td>\n<td>QNX<\/td>\n<td><\/td>\n<td>[Michael_Hunter]<\/td>\n<\/tr>\n<tr>\n<td>107<\/td>\n<td>A\/N<\/td>\n<td>Active Networks<\/td>\n<td><\/td>\n<td>[Bob_Braden]<\/td>\n<\/tr>\n<tr>\n<td>108<\/td>\n<td>IPComp<\/td>\n<td>IP Payload Compression Protocol<\/td>\n<td><\/td>\n<td>[RFC2393]<\/td>\n<\/tr>\n<tr>\n<td>109<\/td>\n<td>SNP<\/td>\n<td>Sitara Networks Protocol<\/td>\n<td><\/td>\n<td>[Manickam_R_Sridhar]<\/td>\n<\/tr>\n<tr>\n<td>110<\/td>\n<td>Compaq-Peer<\/td>\n<td>Compaq Peer Protocol<\/td>\n<td><\/td>\n<td>[Victor_Volpe]<\/td>\n<\/tr>\n<tr>\n<td>111<\/td>\n<td>IPX-in-IP<\/td>\n<td>IPX in IP<\/td>\n<td><\/td>\n<td>[CJ_Lee]<\/td>\n<\/tr>\n<tr>\n<td>112<\/td>\n<td>VRRP<\/td>\n<td>Virtual Router Redundancy Protocol<\/td>\n<td><\/td>\n<td>[RFC5798]<\/td>\n<\/tr>\n<tr>\n<td>113<\/td>\n<td>PGM<\/td>\n<td>PGM Reliable Transport Protocol<\/td>\n<td><\/td>\n<td>[Tony_Speakman]<\/td>\n<\/tr>\n<tr>\n<td>114<\/td>\n<td><\/td>\n<td>any 0-hop protocol<\/td>\n<td><\/td>\n<td>[Internet_Assigned_Numbers_Authority]<\/td>\n<\/tr>\n<tr>\n<td>115<\/td>\n<td>L2TP<\/td>\n<td>Layer Two Tunneling Protocol<\/td>\n<td><\/td>\n<td>[RFC3931][Bernard_Aboba]<\/td>\n<\/tr>\n<tr>\n<td>116<\/td>\n<td>DDX<\/td>\n<td>D-II Data Exchange (DDX)<\/td>\n<td><\/td>\n<td>[John_Worley]<\/td>\n<\/tr>\n<tr>\n<td>117<\/td>\n<td>IATP<\/td>\n<td>Interactive Agent Transfer Protocol<\/td>\n<td><\/td>\n<td>[John_Murphy]<\/td>\n<\/tr>\n<tr>\n<td>118<\/td>\n<td>STP<\/td>\n<td>Schedule Transfer Protocol<\/td>\n<td><\/td>\n<td>[Jean_Michel_Pittet]<\/td>\n<\/tr>\n<tr>\n<td>119<\/td>\n<td>SRP<\/td>\n<td>SpectraLink Radio Protocol<\/td>\n<td><\/td>\n<td>[Mark_Hamilton]<\/td>\n<\/tr>\n<tr>\n<td>120<\/td>\n<td>UTI<\/td>\n<td>UTI<\/td>\n<td><\/td>\n<td>[Peter_Lothberg]<\/td>\n<\/tr>\n<tr>\n<td>121<\/td>\n<td>SMP<\/td>\n<td>Simple Message Protocol<\/td>\n<td><\/td>\n<td>[Leif_Ekblad]<\/td>\n<\/tr>\n<tr>\n<td>122<\/td>\n<td>SM (deprecated)<\/td>\n<td>Simple Multicast Protocol<\/td>\n<td><\/td>\n<td>[Jon_Crowcroft][draft-perlman-simple-multicast]<\/td>\n<\/tr>\n<tr>\n<td>123<\/td>\n<td>PTP<\/td>\n<td>Performance Transparency Protocol<\/td>\n<td><\/td>\n<td>[Michael_Welzl]<\/td>\n<\/tr>\n<tr>\n<td>124<\/td>\n<td>ISIS over IPv4<\/td>\n<td><\/td>\n<td><\/td>\n<td>[Tony_Przygienda]<\/td>\n<\/tr>\n<tr>\n<td>125<\/td>\n<td>FIRE<\/td>\n<td><\/td>\n<td><\/td>\n<td>[Criag_Partridge]<\/td>\n<\/tr>\n<tr>\n<td>126<\/td>\n<td>CRTP<\/td>\n<td>Combat Radio Transport Protocol<\/td>\n<td><\/td>\n<td>[Robert_Sautter]<\/td>\n<\/tr>\n<tr>\n<td>127<\/td>\n<td>CRUDP<\/td>\n<td>Combat Radio User Datagram<\/td>\n<td><\/td>\n<td>[Robert_Sautter]<\/td>\n<\/tr>\n<tr>\n<td>128<\/td>\n<td>SSCOPMCE<\/td>\n<td><\/td>\n<td><\/td>\n<td>[Kurt_Waber]<\/td>\n<\/tr>\n<tr>\n<td>129<\/td>\n<td>IPLT<\/td>\n<td><\/td>\n<td><\/td>\n<td>[[Hollbach]]<\/td>\n<\/tr>\n<tr>\n<td>130<\/td>\n<td>SPS<\/td>\n<td>Secure Packet Shield<\/td>\n<td><\/td>\n<td>[Bill_McIntosh]<\/td>\n<\/tr>\n<tr>\n<td>131<\/td>\n<td>PIPE<\/td>\n<td>Private IP Encapsulation within IP<\/td>\n<td><\/td>\n<td>[Bernhard_Petri]<\/td>\n<\/tr>\n<tr>\n<td>132<\/td>\n<td>SCTP<\/td>\n<td>Stream Control Transmission Protocol<\/td>\n<td><\/td>\n<td>[Randall_R_Stewart]<\/td>\n<\/tr>\n<tr>\n<td>133<\/td>\n<td>FC<\/td>\n<td>Fibre Channel<\/td>\n<td><\/td>\n<td>[Murali_Rajagopal][RFC6172]<\/td>\n<\/tr>\n<tr>\n<td>134<\/td>\n<td>RSVP-E2E-IGNORE<\/td>\n<td><\/td>\n<td><\/td>\n<td>[RFC3175]<\/td>\n<\/tr>\n<tr>\n<td>135<\/td>\n<td>Mobility Header<\/td>\n<td><\/td>\n<td>Y<\/td>\n<td>[RFC6275]<\/td>\n<\/tr>\n<tr>\n<td>136<\/td>\n<td>UDPLite<\/td>\n<td><\/td>\n<td><\/td>\n<td>[RFC3828]<\/td>\n<\/tr>\n<tr>\n<td>137<\/td>\n<td>MPLS-in-IP<\/td>\n<td><\/td>\n<td><\/td>\n<td>[RFC4023]<\/td>\n<\/tr>\n<tr>\n<td>138<\/td>\n<td>manet<\/td>\n<td>MANET Protocols<\/td>\n<td><\/td>\n<td>[RFC5498]<\/td>\n<\/tr>\n<tr>\n<td>139<\/td>\n<td>HIP<\/td>\n<td>Host Identity Protocol<\/td>\n<td>Y<\/td>\n<td>[RFC7401]<\/td>\n<\/tr>\n<tr>\n<td>140<\/td>\n<td>Shim6<\/td>\n<td>Shim6 Protocol<\/td>\n<td>Y<\/td>\n<td>[RFC5533]<\/td>\n<\/tr>\n<tr>\n<td>141<\/td>\n<td>WESP<\/td>\n<td>Wrapped Encapsulating Security Payload<\/td>\n<td><\/td>\n<td>[RFC5840]<\/td>\n<\/tr>\n<tr>\n<td>142<\/td>\n<td>ROHC<\/td>\n<td>Robust Header Compression<\/td>\n<td><\/td>\n<td>[RFC5858]<\/td>\n<\/tr>\n<tr>\n<td>143<\/td>\n<td>Ethernet<\/td>\n<td>Ethernet<\/td>\n<td><\/td>\n<td>[RFC8986]<\/td>\n<\/tr>\n<tr>\n<td>144-252<\/td>\n<td><\/td>\n<td>Unassigned<\/td>\n<td><\/td>\n<td>[Internet_Assigned_Numbers_Authority]<\/td>\n<\/tr>\n<tr>\n<td>253<\/td>\n<td><\/td>\n<td>Use for experimentation and testing<\/td>\n<td>Y<\/td>\n<td>[RFC3692]<\/td>\n<\/tr>\n<tr>\n<td>254<\/td>\n<td><\/td>\n<td>Use for experimentation and testing<\/td>\n<td>Y<\/td>\n<td>[RFC3692]<\/td>\n<\/tr>\n<tr>\n<td>255<\/td>\n<td>Reserved<\/td>\n<td><\/td>\n<td><\/td>\n<td>[Internet_Assigned_Numbers_Authority]<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&#8220;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I have to often do validation on rules set created on a Palo Alto firewall, now if you&#8217;ve done this you&#8217;ll know there&#8217;s\u00a0 a specific requirement to define which protocol to test against. Generally you&#8217;ll use UDP or TCP, and ICMP if needing to validate ping rules. However PAN uses numbers and the provided direct &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/zewwy.ca\/index.php\/2021\/08\/18\/palo-alto-networks-protocols-defined\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Palo Alto Networks Protocols Defined&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[127],"tags":[161,366],"class_list":["post-1212","post","type-post","status-publish","format-standard","hentry","category-palo-alto-networks","tag-pan","tag-protocol"],"_links":{"self":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/1212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/comments?post=1212"}],"version-history":[{"count":1,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/1212\/revisions"}],"predecessor-version":[{"id":1213,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/1212\/revisions\/1213"}],"wp:attachment":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/media?parent=1212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/categories?post=1212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/tags?post=1212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}