<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TCP 179 BGP port exposed to non direct neighbour or multi-hop neighbor, no rules in place allowing such traffic - still reachable in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-179-bgp-port-exposed-to-non-direct-neighbour-or-multi-hop/m-p/486975#M104672</link>
    <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;We just got pinged by security that our Palo's are exposing their TCP 179 to the internet while we utilize BGP as routing protocol to our next hops.&lt;BR /&gt;&lt;BR /&gt;Now we haven't got any explicit rule which should allow TCP 179 on the public side, and yet a non BGP next hop device can reach 179, while we do not have an explicit rule about the routing protocol in place.&lt;BR /&gt;&lt;BR /&gt;How does that work? and how can I limit the exposure of TCP 179 to only my next-hop neighbor?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Fri, 13 May 2022 06:05:37 GMT</pubDate>
    <dc:creator>ColinCant</dc:creator>
    <dc:date>2022-05-13T06:05:37Z</dc:date>
    <item>
      <title>TCP 179 BGP port exposed to non direct neighbour or multi-hop neighbor, no rules in place allowing such traffic - still reachable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-179-bgp-port-exposed-to-non-direct-neighbour-or-multi-hop/m-p/486975#M104672</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;We just got pinged by security that our Palo's are exposing their TCP 179 to the internet while we utilize BGP as routing protocol to our next hops.&lt;BR /&gt;&lt;BR /&gt;Now we haven't got any explicit rule which should allow TCP 179 on the public side, and yet a non BGP next hop device can reach 179, while we do not have an explicit rule about the routing protocol in place.&lt;BR /&gt;&lt;BR /&gt;How does that work? and how can I limit the exposure of TCP 179 to only my next-hop neighbor?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2022 06:05:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-179-bgp-port-exposed-to-non-direct-neighbour-or-multi-hop/m-p/486975#M104672</guid>
      <dc:creator>ColinCant</dc:creator>
      <dc:date>2022-05-13T06:05:37Z</dc:date>
    </item>
    <item>
      <title>Re: TCP 179 BGP port exposed to non direct neighbour or multi-hop neighbor, no rules in place allowing such traffic - still reachable</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-179-bgp-port-exposed-to-non-direct-neighbour-or-multi-hop/m-p/487046#M104677</link>
      <description>&lt;P&gt;Thank you for the post&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/219646"&gt;@ColinCant&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my best guess is that BGP traffic is hitting rule: intrazone-default which by default has action allow. If your firewall is configured to build BGP peer with a BGP neighbor on internet by using local interface then this is not crossing two different zones, so unless you have a rule to block a traffic within zone this will be allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to mitigate this, I would place a rule on the top to allow TCP 179 between your IP on Firewall and IP address you are peering with, then place another rule below that to block everything else. Before I put this configuration in, I would also check log to see there is no legitimate intra-zone traffic. For example ipsec tunnel terminating session on untrust interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2022 10:03:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-179-bgp-port-exposed-to-non-direct-neighbour-or-multi-hop/m-p/487046#M104677</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-05-13T10:03:55Z</dc:date>
    </item>
  </channel>
</rss>

