<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Weird blocking behaviour.. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/weird-blocking-behaviour/m-p/18382#M13412</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You probably need to open a support ticket find the root problem. Did you look at the traffic using the CLI?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show session all filter source &amp;lt;ip&amp;gt;&lt;/P&gt;&lt;P&gt;show session id &amp;lt;xxxxx&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One other thing to try is set up a packet filter for the ip in question.&lt;/P&gt;&lt;P&gt;Then look at the global counters using the packet filter to see stats specific to your traffic flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve Krall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 14 Apr 2011 16:53:31 GMT</pubDate>
    <dc:creator>skrall</dc:creator>
    <dc:date>2011-04-14T16:53:31Z</dc:date>
    <item>
      <title>Weird blocking behaviour..</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/weird-blocking-behaviour/m-p/18379#M13409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Greetings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a user who is using a specific protocol - FTP with explicit TLS or otherwise known as FTPES (not to be confused with SFTP or SCP), and for some reason my firewall is blocking it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PA identifies the transaction as SSL - which I would expect - but both FTP and SSL is explicitely in my allowed protocol/application rukle - yet the transaction is bouncing past this rule and hitting my "bad application" rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can only assume that the PA is identifying this as some form of encrypted tunnel and matching it against the bad appications - but I can't tell WHICH application it's matching it as - the traffic log only shows the packets as "SSL" and denies them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know how I could delve a bit deeper into this and find out what it's matching as so I can put an explicit permit into the firewall ruleset? I've worked around it by adding a user specific/destination specific "any/any" rule for now, but I don't like doing that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any input.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Apr 2011 05:44:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/weird-blocking-behaviour/m-p/18379#M13409</guid>
      <dc:creator>dagibbs</dc:creator>
      <dc:date>2011-04-08T05:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Weird blocking behaviour..</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/weird-blocking-behaviour/m-p/18380#M13410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good morning,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem with esftp and other encrypted ftp clients is that the control session is encrypted and we are not able to identify it as a child of the initiating parent session. On possible work around would be to setup a static NAT for the initiating IP and then you could create explicit ip to ip rules to accommodate the return session request. Naturally this would not be practical in an environment where several nodes would be using this app and the need for individual static NAT rules exhausted your available pool.&lt;/P&gt;&lt;P&gt;There is no work around when the need is to allow an ecrypted control session through a NAT of many to one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~Phil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Apr 2011 17:08:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/weird-blocking-behaviour/m-p/18380#M13410</guid>
      <dc:creator>pkruse</dc:creator>
      <dc:date>2011-04-08T17:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: Weird blocking behaviour..</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/weird-blocking-behaviour/m-p/18381#M13411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;pkruse wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good morning,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem with esftp and other encrypted ftp clients is that the control session is encrypted and we are not able to identify it as a child of the initiating parent session. On possible work around would be to setup a static NAT for the initiating IP and then you could create explicit ip to ip rules to accommodate the return session request. Naturally this would not be practical in an environment where several nodes would be using this app and the need for individual static NAT rules exhausted your available pool.&lt;/P&gt;&lt;P&gt;There is no work around when the need is to allow an ecrypted control session through a NAT of many to one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~Phil&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phil.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not so concerned with identifying the session as a child of the parent link - the firewall appears to be identifying the esftp sesion as SSL, which is fine - but I've got SSL explicitely allowed, and yet the firewall still blocks the session - and I can't figure out why if it's identifying it as SSL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've put in a work around by placing an explicit rule from the user concerned to the destintion concerned (thankfully, it's only one site!) with a blanket "allow" - but I'd still like to know why the SSL identified session bypasses my "default "allow" rule and blocks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Apr 2011 00:10:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/weird-blocking-behaviour/m-p/18381#M13411</guid>
      <dc:creator>dagibbs</dc:creator>
      <dc:date>2011-04-12T00:10:38Z</dc:date>
    </item>
    <item>
      <title>Re: Weird blocking behaviour..</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/weird-blocking-behaviour/m-p/18382#M13412</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You probably need to open a support ticket find the root problem. Did you look at the traffic using the CLI?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show session all filter source &amp;lt;ip&amp;gt;&lt;/P&gt;&lt;P&gt;show session id &amp;lt;xxxxx&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One other thing to try is set up a packet filter for the ip in question.&lt;/P&gt;&lt;P&gt;Then look at the global counters using the packet filter to see stats specific to your traffic flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve Krall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Apr 2011 16:53:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/weird-blocking-behaviour/m-p/18382#M13412</guid>
      <dc:creator>skrall</dc:creator>
      <dc:date>2011-04-14T16:53:31Z</dc:date>
    </item>
  </channel>
</rss>

