<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PA-VM in AWS with Decryption Rule - server side connection kept open in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-vm-in-aws-with-decryption-rule-server-side-connection-kept/m-p/615639#M2293</link>
    <description>&lt;P&gt;Hello, running 11.1.2-h3 on AWS with decryption rule. The setup is: Windows Client --&amp;gt; FW --&amp;gt; Web-Proxy --&amp;gt; Internet&lt;/P&gt;
&lt;P&gt;Firewall decrypts the traffic (so firewall itself acts like proxy). After the client side connection is closed with TCP-FIN, the firewall keeps server side connection to Web-Proxy and both firewall and Web-Proxy exchanges millions of TCP ACK. They never close the connection. This is causing huge packets in the network and causes CPU spike on the firewall and Web-Proxy.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;show session id 3098735 | match count&lt;BR /&gt;total byte count(c2s) : 96946&lt;BR /&gt;total byte count(s2c) : 603114645473&lt;BR /&gt;layer7 packet count(c2s) : 1592&lt;BR /&gt;layer7 packet count(s2c) : 2578574997&lt;/P&gt;
&lt;P&gt;===================================&lt;BR /&gt;show session id 3098735 | match count&lt;BR /&gt;total byte count(c2s) : 96946&lt;BR /&gt;total byte count(s2c) : 603125152686&lt;BR /&gt;layer7 packet count(c2s) : 1592&lt;BR /&gt;layer7 packet count(s2c) : 2578769575&lt;/P&gt;
&lt;P&gt;=================================&lt;BR /&gt;show session id 3098735 | match count&lt;BR /&gt;total byte count(c2s) : 96946&lt;BR /&gt;total byte count(s2c) : 603146147833&lt;BR /&gt;layer7 packet count(c2s) : 1592&lt;BR /&gt;layer7 packet count(s2c) : 2579158374&lt;BR /&gt;&lt;BR /&gt;The session info doesn't reflect that there are packets leaving from the firewall to web-proxy. But packet capture does show.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 29 Oct 2024 20:53:12 GMT</pubDate>
    <dc:creator>karthik.subramaniam</dc:creator>
    <dc:date>2024-10-29T20:53:12Z</dc:date>
    <item>
      <title>PA-VM in AWS with Decryption Rule - server side connection kept open</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-vm-in-aws-with-decryption-rule-server-side-connection-kept/m-p/615639#M2293</link>
      <description>&lt;P&gt;Hello, running 11.1.2-h3 on AWS with decryption rule. The setup is: Windows Client --&amp;gt; FW --&amp;gt; Web-Proxy --&amp;gt; Internet&lt;/P&gt;
&lt;P&gt;Firewall decrypts the traffic (so firewall itself acts like proxy). After the client side connection is closed with TCP-FIN, the firewall keeps server side connection to Web-Proxy and both firewall and Web-Proxy exchanges millions of TCP ACK. They never close the connection. This is causing huge packets in the network and causes CPU spike on the firewall and Web-Proxy.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;show session id 3098735 | match count&lt;BR /&gt;total byte count(c2s) : 96946&lt;BR /&gt;total byte count(s2c) : 603114645473&lt;BR /&gt;layer7 packet count(c2s) : 1592&lt;BR /&gt;layer7 packet count(s2c) : 2578574997&lt;/P&gt;
&lt;P&gt;===================================&lt;BR /&gt;show session id 3098735 | match count&lt;BR /&gt;total byte count(c2s) : 96946&lt;BR /&gt;total byte count(s2c) : 603125152686&lt;BR /&gt;layer7 packet count(c2s) : 1592&lt;BR /&gt;layer7 packet count(s2c) : 2578769575&lt;/P&gt;
&lt;P&gt;=================================&lt;BR /&gt;show session id 3098735 | match count&lt;BR /&gt;total byte count(c2s) : 96946&lt;BR /&gt;total byte count(s2c) : 603146147833&lt;BR /&gt;layer7 packet count(c2s) : 1592&lt;BR /&gt;layer7 packet count(s2c) : 2579158374&lt;BR /&gt;&lt;BR /&gt;The session info doesn't reflect that there are packets leaving from the firewall to web-proxy. But packet capture does show.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 20:53:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/pa-vm-in-aws-with-decryption-rule-server-side-connection-kept/m-p/615639#M2293</guid>
      <dc:creator>karthik.subramaniam</dc:creator>
      <dc:date>2024-10-29T20:53:12Z</dc:date>
    </item>
  </channel>
</rss>

