<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability Protection Profile action drop, but still forwards packets in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/vulnerability-protection-profile-action-drop-but-still-forwards/m-p/530445#M890</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/218171"&gt;@murali438&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Certainly that was the 1st thing I would have checked. The IP has been flagged by multiple entities as seen in the below link:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.abuseipdb.com/check/192.99.180.188" target="_blank"&gt;https://www.abuseipdb.com/check/192.99.180.188&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aamir&lt;/P&gt;</description>
    <pubDate>Thu, 09 Feb 2023 09:00:57 GMT</pubDate>
    <dc:creator>Aamirjan</dc:creator>
    <dc:date>2023-02-09T09:00:57Z</dc:date>
    <item>
      <title>Vulnerability Protection Profile action drop, but still forwards packets</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/vulnerability-protection-profile-action-drop-but-still-forwards/m-p/530434#M888</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A customer has a Palo Alto perimeter firewall and a Fortigate DCFW which sits behind the PA in the line of traffic when incoming from the internet .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It has been observed that in a scenario when the Palo Alto firewall which has SSL Inbound inspection enabled for all internet facing applications and the vulnerability protection signatures are said to 'drop' action, the firewall still seems to be forwarding packets to the Fortigate FW whose IPS engine gets triggered&amp;nbsp; for the same vulnerability and it blocks packets from the same attacker IP address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to understand if this is a bug or the recommended action should be set to a different one for this to be avoided? Ideally the traffic should never each the Fortigate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The screenshots from the PA and Fortigate&amp;nbsp; modules are attached. The PAN OS version is 9.1.15-h1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aamir&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Please note you are posting a public message where community members and experts can provide assistance. Sharing private information such as serial numbers or company information is not recommended.&lt;/P&gt;&lt;BR /&gt;&lt;BR /&gt;Please note you are posting a public message where community members and experts can provide assistance. Sharing private information such as serial numbers or company information is not recommended.</description>
      <pubDate>Thu, 09 Feb 2023 05:43:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/vulnerability-protection-profile-action-drop-but-still-forwards/m-p/530434#M888</guid>
      <dc:creator>Aamirjan</dc:creator>
      <dc:date>2023-02-09T05:43:21Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Protection Profile action drop, but still forwards packets</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/vulnerability-protection-profile-action-drop-but-still-forwards/m-p/530443#M889</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you please validate if it is for the same source and destination IP's that you are getting the drop log on the Fortigate?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2023 08:47:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/vulnerability-protection-profile-action-drop-but-still-forwards/m-p/530443#M889</guid>
      <dc:creator>murali438</dc:creator>
      <dc:date>2023-02-09T08:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Protection Profile action drop, but still forwards packets</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/vulnerability-protection-profile-action-drop-but-still-forwards/m-p/530445#M890</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/218171"&gt;@murali438&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Certainly that was the 1st thing I would have checked. The IP has been flagged by multiple entities as seen in the below link:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.abuseipdb.com/check/192.99.180.188" target="_blank"&gt;https://www.abuseipdb.com/check/192.99.180.188&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aamir&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2023 09:00:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/vulnerability-protection-profile-action-drop-but-still-forwards/m-p/530445#M890</guid>
      <dc:creator>Aamirjan</dc:creator>
      <dc:date>2023-02-09T09:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Protection Profile action drop, but still forwards packets</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/vulnerability-protection-profile-action-drop-but-still-forwards/m-p/530780#M894</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To provide additional info showing the same source IP being detected by the PA and Fortinet VA engines, please find the two screenshots attached.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aamir&lt;/P&gt;</description>
      <pubDate>Sun, 12 Feb 2023 04:43:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/vulnerability-protection-profile-action-drop-but-still-forwards/m-p/530780#M894</guid>
      <dc:creator>Aamirjan</dc:creator>
      <dc:date>2023-02-12T04:43:54Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Protection Profile action drop, but still forwards packets</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/vulnerability-protection-profile-action-drop-but-still-forwards/m-p/531367#M912</link>
      <description>&lt;P&gt;I thought that made a post here but I see it no more. Strange. Did you check with pcap capture for drop and transmit state that the traffic really passes through the firewall? It could be a visual bug?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-checking-for-drops-rejects-discards/td-p/402102" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-checking-for-drops-rejects-discards/td-p/402102&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also defenetly check that the SSL decryption is working for the source IP that you see in the attack as maybe not every time traffic is decrypted. Too bad that you are not using 10.x as it has SSL decryption tab that makes life easier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloUCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloUCAS&lt;/A&gt; &lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/troubleshoot-and-monitor-decryption" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/decryption/troubleshoot-and-monitor-decryption&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And just in case check the release notes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-release-notes/pan-os-9-1-release-information/known-issues/known-issues-related-to-pan-os-9-1-releases/pan-os-9-1-15-known-issues" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-release-notes/pan-os-9-1-release-information/known-issues/known-issues-related-to-pan-os-9-1-releases/pan-os-9-1-15-known-issues&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-release-notes/pan-os-9-1-release-information/known-issues/known-issues-related-to-pan-os-9-1-releases" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-release-notes/pan-os-9-1-release-information/known-issues/known-issues-related-to-pan-os-9-1-releases&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 08:51:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/vulnerability-protection-profile-action-drop-but-still-forwards/m-p/531367#M912</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-02-16T08:51:46Z</dc:date>
    </item>
  </channel>
</rss>

