<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo alto fitrewall that it does not take decision upon first packet while other firewalls take.. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-fitrewall-that-it-does-not-take-decision-upon-first/m-p/14372#M10562</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It makes it more of an art form than a science reading the logs, because now you have to weed out the entries that say the traffic was allowed, but the application is incomplete.&amp;nbsp; Since the firewall has to allow the traffic through until it can identify the application you get these somewhat confusing entries in the logs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The users tend to blame the firewall for things not working and you can't really tell them "the firewall allowed it" since that's not the definitive entry, for it may or may not have blocked it further along in the conversation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 25 Feb 2015 13:05:12 GMT</pubDate>
    <dc:creator>BrianMangan</dc:creator>
    <dc:date>2015-02-25T13:05:12Z</dc:date>
    <item>
      <title>Palo alto fitrewall that it does not take decision upon first packet while other firewalls take..</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-fitrewall-that-it-does-not-take-decision-upon-first/m-p/14369#M10559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;I came to know one thing about palo alto fitrewall that it does not take decision upon first packet, it takes decision after three way handshake.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While other firewalls take decision after first packet. What does it mean and how it is benefiical in terms of Palo alto firewalls?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Feb 2015 12:07:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-fitrewall-that-it-does-not-take-decision-upon-first/m-p/14369#M10559</guid>
      <dc:creator>vsingh</dc:creator>
      <dc:date>2015-02-23T12:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto fitrewall that it does not take decision upon first packet while other firewalls take..</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-fitrewall-that-it-does-not-take-decision-upon-first/m-p/14370#M10560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Depends how you configure rules.&lt;/P&gt;&lt;P&gt;Let's say you want to allow web browsing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Option A: rule allows web-browsing on any port.&lt;/P&gt;&lt;P&gt;PA has to allow enough traffic on any destination port to make sure if the session is web-browsing before it can make a decision. So for TCP you can do 3-way handshake on any destination port and traffic will go through until PA notices it's not web-browsing session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;Option B: rule allows web-browsing only on application-default ports.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;PA has to allow enough traffic on destination port 80 &lt;SPAN style="font-size: 13.3333330154419px;"&gt;to make sure if the session &lt;SPAN style="font-size: 13.3333330154419px;"&gt;is web-browsing before it can make a decision.&lt;/SPAN&gt; Traffic on any other destination port will be dropped before it finishes 3 way handshake (already SYN packet will be dropped).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Feb 2015 12:32:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-fitrewall-that-it-does-not-take-decision-upon-first/m-p/14370#M10560</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2015-02-23T12:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto fitrewall that it does not take decision upon first packet while other firewalls take..</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-fitrewall-that-it-does-not-take-decision-upon-first/m-p/14371#M10561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Or Option C (like any other Firewall): Allow any Application on Port 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAN make the decision at the first TCP SYN Packet when Traffic comes on Port 80 and allow any Traffic on Port 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;..... yes i'm kidding sorry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Feb 2015 10:52:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-fitrewall-that-it-does-not-take-decision-upon-first/m-p/14371#M10561</guid>
      <dc:creator>MarcoLeckel</dc:creator>
      <dc:date>2015-02-25T10:52:10Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto fitrewall that it does not take decision upon first packet while other firewalls take..</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-fitrewall-that-it-does-not-take-decision-upon-first/m-p/14372#M10562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It makes it more of an art form than a science reading the logs, because now you have to weed out the entries that say the traffic was allowed, but the application is incomplete.&amp;nbsp; Since the firewall has to allow the traffic through until it can identify the application you get these somewhat confusing entries in the logs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The users tend to blame the firewall for things not working and you can't really tell them "the firewall allowed it" since that's not the definitive entry, for it may or may not have blocked it further along in the conversation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Feb 2015 13:05:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-fitrewall-that-it-does-not-take-decision-upon-first/m-p/14372#M10562</guid>
      <dc:creator>BrianMangan</dc:creator>
      <dc:date>2015-02-25T13:05:12Z</dc:date>
    </item>
  </channel>
</rss>

