<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Session end reason threat traffic allow in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/session-end-reason-threat-traffic-allow/m-p/451467#M101156</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Thanks for the great suggestion&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I think it’s behavior of APP-ID check.&lt;/P&gt;&lt;P&gt;When traffic through firewall, Palo Alto will try to analysis / handshake those packet and visible it, traffic already sent and received at &amp;nbsp;before spyware identification.&lt;/P&gt;&lt;P&gt;We just set action Drop to mitigate and reduce rate for event occurs, if we haven’t ip layer info.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tyson&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 06 Dec 2021 02:10:19 GMT</pubDate>
    <dc:creator>Tyson-Liu</dc:creator>
    <dc:date>2021-12-06T02:10:19Z</dc:date>
    <item>
      <title>Session end reason threat traffic allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/session-end-reason-threat-traffic-allow/m-p/432658#M95887</link>
      <description>&lt;P&gt;Hi Everyone&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we got the problem for session end reason “threat”, cause we detected the coin miner traffic through firewall and transmission to internet, even we saw the session end reason already hit to threat when the spyware traffic initially and threat log show result to drop for same session, but the traffic seems like still pass through to firewall, because we can look the send &amp;amp; receive packet growing up by magnifier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;my confused is if the session reason already count to “threat” and threat log action to drop, it should be discard session or not?&lt;/P&gt;
&lt;P&gt;if yes, why still receive and transmit packet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thx&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tyson&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 18:53:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/session-end-reason-threat-traffic-allow/m-p/432658#M95887</guid>
      <dc:creator>Tyson-Liu</dc:creator>
      <dc:date>2021-09-08T18:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: Session end reason threat traffic allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/session-end-reason-threat-traffic-allow/m-p/432710#M95888</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/162302"&gt;@Tyson-Liu&lt;/a&gt;&amp;nbsp; for this post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you please confirm what signature is getting hit and PAN-OS you are running?&lt;/P&gt;
&lt;P&gt;Also, when you navigate to session browser under:&amp;nbsp;Monitor &amp;gt; Session Browser can you see the session still alive?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Sep 2021 04:25:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/session-end-reason-threat-traffic-allow/m-p/432710#M95888</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2021-09-09T04:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: Session end reason threat traffic allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/session-end-reason-threat-traffic-allow/m-p/433039#M95889</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt;&amp;nbsp; Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's 86358 threat ID (CoinMiner Command &amp;amp; Control traffic detection) at the PAN-OS 9.0.11 version, the application visibility to json-rpc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we can not replicate traffic because internal rule,&amp;nbsp; but the visit record of&amp;nbsp;malicious site from our security operation center,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tyson&lt;/P&gt;</description>
      <pubDate>Fri, 10 Sep 2021 09:44:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/session-end-reason-threat-traffic-allow/m-p/433039#M95889</guid>
      <dc:creator>Tyson-Liu</dc:creator>
      <dc:date>2021-09-10T09:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: Session end reason threat traffic allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/session-end-reason-threat-traffic-allow/m-p/436377#M96261</link>
      <description>&lt;P&gt;Thank you for reply&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/162302"&gt;@Tyson-Liu&lt;/a&gt;&amp;nbsp; and sorry for getting back to you with delay.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know you mentioned that you can't reproduce it, however if you come across similar case for different signature as a next action I would recommend to get a session ID and then from CLI issue:&amp;nbsp;show session id &amp;lt;session id&amp;gt; | match count&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will get below output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;total byte count(c2s) :&amp;nbsp;&lt;BR /&gt;total byte count(s2c) :&amp;nbsp;&lt;BR /&gt;layer7 packet count(c2s) :&amp;nbsp;&lt;BR /&gt;layer7 packet count(s2c) :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you can by re-running this command still see bytes increasing, it is possible that for c2s, the infected client is still sending some traffic hitting this signature.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Fri, 24 Sep 2021 06:03:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/session-end-reason-threat-traffic-allow/m-p/436377#M96261</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2021-09-24T06:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: Session end reason threat traffic allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/session-end-reason-threat-traffic-allow/m-p/451467#M101156</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Thanks for the great suggestion&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I think it’s behavior of APP-ID check.&lt;/P&gt;&lt;P&gt;When traffic through firewall, Palo Alto will try to analysis / handshake those packet and visible it, traffic already sent and received at &amp;nbsp;before spyware identification.&lt;/P&gt;&lt;P&gt;We just set action Drop to mitigate and reduce rate for event occurs, if we haven’t ip layer info.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tyson&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Dec 2021 02:10:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/session-end-reason-threat-traffic-allow/m-p/451467#M101156</guid>
      <dc:creator>Tyson-Liu</dc:creator>
      <dc:date>2021-12-06T02:10:19Z</dc:date>
    </item>
  </channel>
</rss>

