<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firewall creates seperate sessions for C2S and S2C in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewall-creates-seperate-sessions-for-c2s-and-s2c/m-p/599706#M3845</link>
    <description>&lt;P&gt;Hi folks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was troubleshooting SSH connection and want to know if I missed something.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The topology is following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Client ---&amp;gt; PFSENSE &amp;lt;====ipsec tunnel ====&amp;gt; PA VM ==== ipsec tunnel ==== AZURE ---&amp;gt; Server&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SSHconnect.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/62608iF5C161328567B782/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SSHconnect.png" alt="SSHconnect.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Client tries to establish SSH session with linux server. After some timeout the connection fails and we see app incomplete in traffic logs. So we captured traffic and see that firewall drops SYN-ACK sent from server. We also took counters and can see that Non-Syn packet with no session match drop counter has been generated.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We decided to allow non-syn tcp packet on both zones by enabling it on the zone-protection profile.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As soon as we enabled it, we could see that now firewall creates separate session sourced from Server to client.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then we again checked with global counters and now the firewall don't show non-syn counter as drop, however we noticed new counter "Split TCP handshake":&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Article below says that PA firewalls normally handles sessions with split handhske:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSzCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSzCAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, we receive syn-ack and that has to be normal behavior and we dont see split handshake. From the captures took on the server side we see that server receives SYN and sends back SYN-ACK. Source and destination ports seems to be ok.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What we also checked:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Asymmetric routing. There is no asymmetry in our topology&lt;/P&gt;
&lt;P&gt;- DoS policies, all good.&lt;/P&gt;
&lt;P&gt;- Egress and Ingress interface, also all good.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am wondering if I overlooked something and the issue might be very simple such as too high MTU due to IPSEC overhead, but I dont thing that MTU issue can cause firewall to create seperate session.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help would be appreciated!&lt;/P&gt;</description>
    <pubDate>Mon, 07 Oct 2024 14:41:38 GMT</pubDate>
    <dc:creator>FarkhanAliyev</dc:creator>
    <dc:date>2024-10-07T14:41:38Z</dc:date>
    <item>
      <title>Firewall creates seperate sessions for C2S and S2C</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewall-creates-seperate-sessions-for-c2s-and-s2c/m-p/599706#M3845</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was troubleshooting SSH connection and want to know if I missed something.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The topology is following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Client ---&amp;gt; PFSENSE &amp;lt;====ipsec tunnel ====&amp;gt; PA VM ==== ipsec tunnel ==== AZURE ---&amp;gt; Server&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SSHconnect.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/62608iF5C161328567B782/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SSHconnect.png" alt="SSHconnect.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Client tries to establish SSH session with linux server. After some timeout the connection fails and we see app incomplete in traffic logs. So we captured traffic and see that firewall drops SYN-ACK sent from server. We also took counters and can see that Non-Syn packet with no session match drop counter has been generated.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We decided to allow non-syn tcp packet on both zones by enabling it on the zone-protection profile.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As soon as we enabled it, we could see that now firewall creates separate session sourced from Server to client.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then we again checked with global counters and now the firewall don't show non-syn counter as drop, however we noticed new counter "Split TCP handshake":&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Article below says that PA firewalls normally handles sessions with split handhske:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSzCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSzCAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, we receive syn-ack and that has to be normal behavior and we dont see split handshake. From the captures took on the server side we see that server receives SYN and sends back SYN-ACK. Source and destination ports seems to be ok.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What we also checked:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Asymmetric routing. There is no asymmetry in our topology&lt;/P&gt;
&lt;P&gt;- DoS policies, all good.&lt;/P&gt;
&lt;P&gt;- Egress and Ingress interface, also all good.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am wondering if I overlooked something and the issue might be very simple such as too high MTU due to IPSEC overhead, but I dont thing that MTU issue can cause firewall to create seperate session.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help would be appreciated!&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2024 14:41:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/firewall-creates-seperate-sessions-for-c2s-and-s2c/m-p/599706#M3845</guid>
      <dc:creator>FarkhanAliyev</dc:creator>
      <dc:date>2024-10-07T14:41:38Z</dc:date>
    </item>
  </channel>
</rss>

