<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow dark trace rst packets in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/allow-dark-trace-rst-packets/m-p/588653#M3254</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Check the unified logs and see the information as to why the DT packets are being dropped. Then create a security policy to allow that type of traffic. Might have to disable some security features on the security policy to allow this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Mon, 03 Jun 2024 21:54:06 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2024-06-03T21:54:06Z</dc:date>
    <item>
      <title>Allow dark trace rst packets</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/allow-dark-trace-rst-packets/m-p/588651#M3253</link>
      <description>&lt;P&gt;We have a 5220 at the core of our network making east / west decisions between LAN segments and dark trace (DT) appliance. I currently have the DT appliance configured to take autonomous action with DT respond.&amp;nbsp; One of the ways DT enforces this is by sending TCP RST packets to the "infected pc," by spoofing the source and/or destination IP address. As you can imagine, this gets dropped as soon as it hits the PA gateway interface and never reaches the destination PC.&lt;/P&gt;
&lt;P&gt;Is there a way to allow an exception just for the Dark Trace appliance to send RST packets (from spoofed IP) to any LAN segment through the PA?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 21:50:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/allow-dark-trace-rst-packets/m-p/588651#M3253</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2024-06-03T21:50:41Z</dc:date>
    </item>
    <item>
      <title>Re: Allow dark trace rst packets</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/allow-dark-trace-rst-packets/m-p/588653#M3254</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Check the unified logs and see the information as to why the DT packets are being dropped. Then create a security policy to allow that type of traffic. Might have to disable some security features on the security policy to allow this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 21:54:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/allow-dark-trace-rst-packets/m-p/588653#M3254</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-06-03T21:54:06Z</dc:date>
    </item>
  </channel>
</rss>

