<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: arp Flooding in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598689#M119079</link>
    <description>&lt;P&gt;ISP &amp;lt;--&amp;gt; Cisco Router &amp;lt;--&amp;gt; palo alto firewall&lt;/P&gt;
&lt;P&gt;outside -- &amp;gt; cisco router than to Palo Alto Firewall&lt;/P&gt;
&lt;P&gt;When firewall see invalid port or our Public ip address it forwards ARP flood asking the router&amp;nbsp; where this ip address or this address with port&amp;nbsp;&lt;BR /&gt;Palo Alto has default out to the Cisco Router and when we did packet capture 69% of was ARP flooding asking where is this&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 Sep 2024 22:08:58 GMT</pubDate>
    <dc:creator>Jameslee20</dc:creator>
    <dc:date>2024-09-24T22:08:58Z</dc:date>
    <item>
      <title>arp Flooding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598670#M119070</link>
      <description>&lt;P&gt;Cisco router is getting flooding from Palo Alto firewall&lt;/P&gt;
&lt;P&gt;Source NAT is basic getting scan from outside random countries&lt;/P&gt;
&lt;P&gt;We deal with users in other countries and blocking by&amp;nbsp;countries will not work.&lt;/P&gt;
&lt;P&gt;the ranges from outside to our public ip address&lt;/P&gt;
&lt;P&gt;It looks like a scanning because it's rang of our public ip address&lt;/P&gt;
&lt;P&gt;what can we do to stop it or protection&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;it looks like this but i'm using private as example but they are scanning our two /24 pubic ip address&lt;/P&gt;
&lt;P&gt;192.168.20.1 port&lt;/P&gt;
&lt;P&gt;192.168.20.3 port&lt;/P&gt;
&lt;P&gt;192.168.20.5 port&lt;/P&gt;
&lt;P&gt;192.168.20.16 port&lt;/P&gt;
&lt;P&gt;Etc...&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 17:39:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598670#M119070</guid>
      <dc:creator>Jameslee20</dc:creator>
      <dc:date>2024-09-24T17:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: arp Flooding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598672#M119071</link>
      <description>&lt;P&gt;Traffic is like this?&lt;/P&gt;
&lt;P&gt;Internet &amp;gt; Palo &amp;gt; Cisco router&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does Palo have NAT policy that this traffic matches?&lt;/P&gt;
&lt;P&gt;Can you share it?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 17:52:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598672#M119071</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2024-09-24T17:52:10Z</dc:date>
    </item>
    <item>
      <title>Re: arp Flooding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598680#M119074</link>
      <description>&lt;P&gt;it doesn't match with some ports or vaild ip address and Palo alto send the arp request who has the port or ip address to it&lt;/P&gt;
&lt;P&gt;some people is doing random scanning to thos invaild ports and invaild ip address&lt;/P&gt;
&lt;P&gt;we do have vaild ports and vaild but not all is used&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 19:52:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598680#M119074</guid>
      <dc:creator>Jameslee20</dc:creator>
      <dc:date>2024-09-24T19:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: arp Flooding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598684#M119077</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/144255"&gt;@Jameslee20&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Cisco router is getting flooding from Palo Alto firewall&lt;/P&gt;
&lt;P&gt;Source NAT is basic getting scan from outside random countries&lt;/P&gt;
&lt;P&gt;We deal with users in other countries and blocking by&amp;nbsp;countries will not work.&lt;/P&gt;
&lt;P&gt;the ranges from outside to our public ip address&lt;/P&gt;
&lt;P&gt;It looks like a scanning because it's rang of our public ip address&lt;/P&gt;
&lt;P&gt;what can we do to stop it or protection&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;it looks like this but i'm using private as example but they are scanning our two /24 pubic ip address&lt;/P&gt;
&lt;P&gt;192.168.20.1 port&lt;/P&gt;
&lt;P&gt;192.168.20.3 port&lt;/P&gt;
&lt;P&gt;192.168.20.5 port&lt;/P&gt;
&lt;P&gt;192.168.20.16 port&lt;/P&gt;
&lt;P&gt;Etc...&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I want to clarify what you're saying is actually going on:&lt;BR /&gt;&lt;BR /&gt;"Cisco router is getting flooding from Palo Alto firewall"&amp;nbsp; &amp;nbsp;...&amp;nbsp; &amp;nbsp; "&lt;SPAN&gt;It looks like a scanning because it's rang of our public ip address"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What is your boundary architecture?&amp;nbsp; ISP &amp;lt;--&amp;gt; Border Router &amp;lt;--&amp;gt; Palo FW&amp;nbsp; ??&amp;nbsp; Is this how your edge is deployed?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If I described your boundary correct does your border router "own" your public IP space?&amp;nbsp; When you say that the Palo is "flooding" your Cisco router, are you meaning that the downstream Palo is "arping" out for IPs that the border router owns?&amp;nbsp; If all of what I described is true, then my suspicion is that the L3 interface object on your PA firewall is set as wrong mask.&amp;nbsp; If the IP object is a /24 for instance, but the /24 is actually owned by the upstream router then the Palo will actually ARP out for all IPs in the /24.&amp;nbsp; In this instance the IP object on the L3 interface of the Palo needs to just be a /32.&amp;nbsp; Converting the IP object to a /32 will stop the upstream Cisco Border router from seeing the Palo flood it.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Hopefully this is getting at what you're seeing.&amp;nbsp; If not please clarify.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 20:53:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598684#M119077</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2024-09-24T20:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: arp Flooding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598689#M119079</link>
      <description>&lt;P&gt;ISP &amp;lt;--&amp;gt; Cisco Router &amp;lt;--&amp;gt; palo alto firewall&lt;/P&gt;
&lt;P&gt;outside -- &amp;gt; cisco router than to Palo Alto Firewall&lt;/P&gt;
&lt;P&gt;When firewall see invalid port or our Public ip address it forwards ARP flood asking the router&amp;nbsp; where this ip address or this address with port&amp;nbsp;&lt;BR /&gt;Palo Alto has default out to the Cisco Router and when we did packet capture 69% of was ARP flooding asking where is this&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 22:08:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598689#M119079</guid>
      <dc:creator>Jameslee20</dc:creator>
      <dc:date>2024-09-24T22:08:58Z</dc:date>
    </item>
    <item>
      <title>Re: arp Flooding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598690#M119080</link>
      <description>&lt;P&gt;When we search for the public&amp;nbsp; ip address for the Source NAT they were /32.&lt;/P&gt;
&lt;P&gt;I mean i can double check we didn't see a /24 and saw /32 for source NAT&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 22:12:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598690#M119080</guid>
      <dc:creator>Jameslee20</dc:creator>
      <dc:date>2024-09-24T22:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: arp Flooding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598691#M119081</link>
      <description>&lt;P&gt;I'm trying to look for Port scanning protection from scanning from outside&lt;/P&gt;
&lt;P&gt;Do know what is call or name of it&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 22:17:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598691#M119081</guid>
      <dc:creator>Jameslee20</dc:creator>
      <dc:date>2024-09-24T22:17:01Z</dc:date>
    </item>
    <item>
      <title>Re: arp Flooding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598747#M119093</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/144255"&gt;@Jameslee20&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;ISP &amp;lt;--&amp;gt; Cisco Router &amp;lt;--&amp;gt; palo alto firewall&lt;/P&gt;
&lt;P&gt;outside -- &amp;gt; cisco router than to Palo Alto Firewall&lt;/P&gt;
&lt;P&gt;When firewall see invalid port or our Public ip address it forwards ARP flood asking the router&amp;nbsp; where this ip address or this address with port&amp;nbsp;&lt;BR /&gt;Palo Alto has default out to the Cisco Router and when we did packet capture 69% of was ARP flooding asking where is this&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;There are CLI arp commands that would be really useful to troubleshoot in this situation.&amp;nbsp; There's still a lack of IP infrastructure in your network so I'm not certain but I'll make some assumptions up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your border router owns 192.168.20.0/24 and it's the .1...We'll call this VLAN 20.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your FW has an interface in VLAN 20?&amp;nbsp; This is either a single physical interface 1/14.20 or in an ae1.20.&amp;nbsp; The FW has an IP in .20.&amp;nbsp; The IP address here, is it a /32 or something different?&amp;nbsp; If there's no mask described then /32 is implicit.&amp;nbsp; If it is something other than a /32 and the FW doesn't own that network this is likely your problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you say the FW is garping out looking for a host this is usually because the FW isn't on the same L2.&amp;nbsp; So I'd check the masks between the 2 networks and make sure something isn't off.&amp;nbsp; After this is confirmed get into the CLI and look at the ARP table of the firewall the FW should see the MAC of the neighbor it's looking for here, or there's a routing problem.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 12:27:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/arp-flooding/m-p/598747#M119093</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2024-09-25T12:27:22Z</dc:date>
    </item>
  </channel>
</rss>

