<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone protection question in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1222116#M5618</link>
    <description>&lt;P&gt;What is you SYN Cookie activation rate in Zone Protection profile?&lt;/P&gt;
&lt;P&gt;Can security scanner be calmed down to keep new session count (together with existing traffic) below that threshold?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 27 Feb 2025 02:56:58 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2025-02-27T02:56:58Z</dc:date>
    <item>
      <title>Zone protection question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1221735#M5585</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I’d like to add an IP to be exempted from zone protection. Is this possible on the firewall?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;How we can achive this please suggest&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 07:53:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1221735#M5585</guid>
      <dc:creator>shirishkulkarni</dc:creator>
      <dc:date>2025-02-24T07:53:26Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1221763#M5588</link>
      <description>&lt;P&gt;Do you mean exclusion from reconnaissance protection?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1740404084837.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66176i0CA5B935544A4837/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1740404084837.png" alt="Raido_Rattameister_0-1740404084837.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 13:35:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1221763#M5588</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-02-24T13:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1221883#M5598</link>
      <description>&lt;P style="font-weight: 400;"&gt;&lt;SPAN&gt;During an internal vulnerability scan, we discovered that the scanner detects all ports as open on networks where the firewall is installed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&lt;SPAN&gt;I suspect this issue is caused by the zone protection feature, specifically the flood protection for SYN packets.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&lt;SPAN&gt;Rather than disabling the protection entirely, can we create an exception that allows the scanner to run scans without restrictions&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 08:31:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1221883#M5598</guid>
      <dc:creator>shirishkulkarni</dc:creator>
      <dc:date>2025-02-25T08:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1221919#M5604</link>
      <description>&lt;P&gt;Are you saying that scan was done from one network zone to another and firewall rules are in between?&lt;/P&gt;
&lt;P&gt;Do you have application and service both set correctly?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let's assume you have following policy to permit incoming email and your email server public IP is 5.5.5.5.&lt;/P&gt;
&lt;P&gt;This is very insecure rule because it permits anyone on the internet to perform port scan against your email server (because service is not set).&lt;/P&gt;
&lt;P&gt;Initial TCP 3way handshake is permitted through on any port and only after 3way handshake is completed firewall can identify application based on signature to identify if application is actually SMTP or not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_1-1740490887954.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66197iC53F03468E9D5ADA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_1-1740490887954.png" alt="Raido_Rattameister_1-1740490887954.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So as a first step look at your traffic logs and check maybe some rule actually permitted scanner traffic through it unintentionally.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 13:46:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1221919#M5604</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-02-25T13:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1222064#M5614</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;You can create a security policy that has the source IP and zone as your scanners and destination zone/IP what you are scanning and just dont apply any Actions. Then you have to throttle the scan so it doesnt trigger your zone protection:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_0-1740603412762.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66213i903FC2006A2B788B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_0-1740603412762.png" alt="OtakarKlier_0-1740603412762.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2025 20:57:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1222064#M5614</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2025-02-26T20:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1222093#M5615</link>
      <description>&lt;P&gt;&lt;SPAN&gt;The core issue is that during a port scan on a device within the LAN, it appears that the firewall, rather than the actual device, is responding. This results in the scanner falsely indicating that all ports on the device are open, leading to incorrect vulnerability reports.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If we create the policy by default, we have to add action as allowed. The problem is firewall is responding and say all ports are open. D&lt;/SPAN&gt;&lt;SPAN&gt;o you have any solution on it&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2025 00:35:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1222093#M5615</guid>
      <dc:creator>shirishkulkarni</dc:creator>
      <dc:date>2025-02-27T00:35:49Z</dc:date>
    </item>
    <item>
      <title>Re: Zone protection question</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1222116#M5618</link>
      <description>&lt;P&gt;What is you SYN Cookie activation rate in Zone Protection profile?&lt;/P&gt;
&lt;P&gt;Can security scanner be calmed down to keep new session count (together with existing traffic) below that threshold?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2025 02:56:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/zone-protection-question/m-p/1222116#M5618</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-02-27T02:56:58Z</dc:date>
    </item>
  </channel>
</rss>

