<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic denied by one context is allowed in the other in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15229#M11183</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Srikant,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please upload both "Allow"ed and "Deny"ed traffic log in thread. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will help me to determine root cause.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 14 Sep 2014 11:43:17 GMT</pubDate>
    <dc:creator>hshah</dc:creator>
    <dc:date>2014-09-14T11:43:17Z</dc:date>
    <item>
      <title>Traffic denied by one context is allowed in the other</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15228#M11182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I have a strange situation and need some help.&lt;/P&gt;&lt;P&gt;I have 2 legs of my firewall implemented on Core and Edge level. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a host 10.1.1.10 behind my Core layer firewall trying to access an external FTP server.&lt;/P&gt;&lt;P&gt;On the core layer I have a policy to deny ftp traffic from inside to outside and the logs show the traffic is denied.&lt;/P&gt;&lt;P&gt;But on the Edge level i see one more traffic log saying allow for the same traffic. ( Edge has a rule to allow any type of traffic)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default gateway of Core firewall is pointing towards the edge firewall. &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Any help on this is much appreciated.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks.&lt;/P&gt;&lt;P&gt;Srikanth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Sep 2014 06:14:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15228#M11182</guid>
      <dc:creator>SrikanthSingireddy</dc:creator>
      <dc:date>2014-09-14T06:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic denied by one context is allowed in the other</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15229#M11183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Srikant,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please upload both "Allow"ed and "Deny"ed traffic log in thread. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will help me to determine root cause.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Sep 2014 11:43:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15229#M11183</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-14T11:43:17Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic denied by one context is allowed in the other</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15230#M11184</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you enable &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;packet capture&lt;/SPAN&gt; on the PAN firewall, please verify, if any packet received or transmitted through PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;Also, you&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; can check the real time session in the CLI by using 'show session all filter &lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;source&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; IP_ADD_OF_THE_TESTING_PC destination IP_ADD_OF_THE_DESTINATION'.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&amp;gt;&amp;nbsp; If there is &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;a&lt;/SPAN&gt; session exist for the same traffic,&amp;nbsp; then please &lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;apply&amp;nbsp; CLI command PAN&amp;gt; show session id XYZ&amp;nbsp;&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; to get detailed information about that session, &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;i.e&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt; NAT rule, security rule, ingress/egress interface etc.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Hope&amp;nbsp; this helps.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Sep 2014 19:57:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15230#M11184</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-09-14T19:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic denied by one context is allowed in the other</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15231#M11185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12.727272033691406px;"&gt;Srikanth&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you enable packetcaptures you'll likely see that the edge firewall is receiving a tcp handshake (and is logging an accept action for that)&lt;/P&gt;&lt;P&gt;On your core firewall you are blocking based on application, but that application can only be determined after several packets have passed through that allow the forewall to positively identify ftp. In this case the tcp handshake will need to be allowed through before the first ftp packet is seen, identified and denied. by that time the edge firewall has also seen the handshake and has a session open pending the next packet, which will never arrive as the core firewall blocked it.&lt;/P&gt;&lt;P&gt;If you want a more strikt policy you can add service ports to your security policy which will block traffic before it requires identification. setting a block policy for port 21 will block normal ftp from the very first packet. on the other hand, using only the service port will not block an application if it is running on a different port (hence the power of appID), buit will require some packets (tcp handshake) to be trickled through for the process to function properly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Sep 2014 10:42:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15231#M11185</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2014-09-15T10:42:24Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic denied by one context is allowed in the other</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15232#M11186</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Agree with what tpiens had to say. Also wanted to mention that there are users who try to use application default service in the security policy blocking FTP traffic so that traffic only on tcp port 21 is blocked. But this is not recommended. If you are trying to block FTP traffic, it is better to block on all service ports instead of default ports only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Sep 2014 20:39:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15232#M11186</guid>
      <dc:creator>tshiv</dc:creator>
      <dc:date>2014-09-15T20:39:27Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic denied by one context is allowed in the other</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15233#M11187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I was thinking about the same to determine the application&amp;nbsp; palo alto needs several packets to understand the behaviour.&lt;/P&gt;&lt;P&gt;But the same thing is not happening for other tcp traffic like http and https and we have verified this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also just in case if there are 2 contexts of firewalls used for 2 different companies then seeing one firewall log on the other is a serious concern.&lt;/P&gt;&lt;P&gt;Support team isn't able to help me in this as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Sep 2014 20:45:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15233#M11187</guid>
      <dc:creator>SrikanthSingireddy</dc:creator>
      <dc:date>2014-09-15T20:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic denied by one context is allowed in the other</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15234#M11188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG alt="core and edge issue.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15560_core and edge issue.png" style="height: 131px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;Please follow the logs from bottom to top&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The host 172.17 is inside the core network and is being denied by the Core firewall.&lt;/P&gt;&lt;P&gt;The same traffic is reaching the Edge firewall and is being allowed according to a rule configured on the Edge firewall basically permitting ftp access outside.&lt;/P&gt;&lt;P&gt;Any help on this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Sep 2014 20:58:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15234#M11188</guid>
      <dc:creator>SrikanthSingireddy</dc:creator>
      <dc:date>2014-09-15T20:58:01Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic denied by one context is allowed in the other</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15235#M11189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you expecting that the traffic will never reach the Edge firewall because of the deny policy on the Core, and therefore you should not even see a session on the Edge?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are the Core and Edge firewalls different vsys on the same physical device?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Sep 2014 21:07:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15235#M11189</guid>
      <dc:creator>kfindlen</dc:creator>
      <dc:date>2014-09-15T21:07:27Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic denied by one context is allowed in the other</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15236#M11190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Srikant,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is 40 second delay between similar traffic logs. If traffic log was generated because of same packet than log should have been generated immediately.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Sep 2014 23:01:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-denied-by-one-context-is-allowed-in-the-other/m-p/15236#M11190</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-15T23:01:27Z</dc:date>
    </item>
  </channel>
</rss>

