<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tweaking DSRI in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tweaking-dsri/m-p/23575#M17190</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had to Google to find out what DSRI stands for:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DSRI = Disable Server Response Inspection (in case someone else wonders &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found this document at the same time regarding performance figures:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.commsolutions.com/uploads/PA-lNetwork%20World%20PA-5060%20Review.pdf"&gt;http://www.commsolutions.com/uploads/PA-lNetwork%20World%20PA-5060%20Review.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So yes if performance is an issue (and you cant get more PA-boxes to cluster as described in &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.paloaltonetworks.com/literature/solution-briefs/tech-partners/arista.pdf"&gt;http://www.paloaltonetworks.com/literature/solution-briefs/tech-partners/arista.pdf&lt;/A&gt;&lt;SPAN&gt; ) you can enable DSRI (that is disabling server response inspection) for specific flows.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However there are many cases where disabling DSRI (that is enable server response inspection) would be good security wise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Clients browsing the Internet is probably the most obvious (this way we can detect infected clients (trying to infect servers) but also infected servers trying to infect clients). This including "trusted" sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I think it can be healthy also for incoming traffic to your own internal servers. If you have DSRI enabled for those flows you wont detect (and possible block) if one of these servers gets infected. And the risk might be higher for that on internal networks because you often keep a track on patching (hopefully &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; the servers in DMZ (facing Internet) but internal servers tends to get sloppy after a while (or are appliances where it depends on how active the vendor is before patches are released). Probably because the threat isnt as visible as with that Internet facing DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder if the PA-devices are "smart enough" to not perform server response inspection where this inspection wouldnt find something bad anyway (which on its own might be bad aswell if you enable IPS and it actually wont do as you think it does)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or for that matter what is disabled when you disable server response inspection? Could you for example enable inspection for the antivirus engine but disable it for the IPS - and if so, would you really gain something performancewise as quoting from the above pdf:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;Regardless of which UTM features we enabled - intrusion prevention, antispyware, antivirus, or any combination of these - results were essentially the same as if we'd turned on just one such feature. Simply put, there's no extra performance cost, beyond the initial sharp drop in rates, for layering on multiple types of traffic inspection.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: Changed some text above because disabling DSRI actually enables server response inspection :smileysilly:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 15 Nov 2012 08:35:04 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-11-15T08:35:04Z</dc:date>
    <item>
      <title>Tweaking DSRI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tweaking-dsri/m-p/23574#M17189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I keep hearing that disabling DSRI will improve performance.&amp;nbsp; I thought I read that most vendors do not even offer the option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are some guidelines for disabling DSRI?&amp;nbsp; I understand that incoming to own internal server is probably ok, but what about disabling for some client security rules.&amp;nbsp; Immediate examples are trusted sites like Netflix, X-box access, wii access, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2012 02:52:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tweaking-dsri/m-p/23574#M17189</guid>
      <dc:creator>BobW</dc:creator>
      <dc:date>2012-11-15T02:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Tweaking DSRI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tweaking-dsri/m-p/23575#M17190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had to Google to find out what DSRI stands for:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DSRI = Disable Server Response Inspection (in case someone else wonders &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found this document at the same time regarding performance figures:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.commsolutions.com/uploads/PA-lNetwork%20World%20PA-5060%20Review.pdf"&gt;http://www.commsolutions.com/uploads/PA-lNetwork%20World%20PA-5060%20Review.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So yes if performance is an issue (and you cant get more PA-boxes to cluster as described in &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.paloaltonetworks.com/literature/solution-briefs/tech-partners/arista.pdf"&gt;http://www.paloaltonetworks.com/literature/solution-briefs/tech-partners/arista.pdf&lt;/A&gt;&lt;SPAN&gt; ) you can enable DSRI (that is disabling server response inspection) for specific flows.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However there are many cases where disabling DSRI (that is enable server response inspection) would be good security wise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Clients browsing the Internet is probably the most obvious (this way we can detect infected clients (trying to infect servers) but also infected servers trying to infect clients). This including "trusted" sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I think it can be healthy also for incoming traffic to your own internal servers. If you have DSRI enabled for those flows you wont detect (and possible block) if one of these servers gets infected. And the risk might be higher for that on internal networks because you often keep a track on patching (hopefully &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; the servers in DMZ (facing Internet) but internal servers tends to get sloppy after a while (or are appliances where it depends on how active the vendor is before patches are released). Probably because the threat isnt as visible as with that Internet facing DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder if the PA-devices are "smart enough" to not perform server response inspection where this inspection wouldnt find something bad anyway (which on its own might be bad aswell if you enable IPS and it actually wont do as you think it does)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or for that matter what is disabled when you disable server response inspection? Could you for example enable inspection for the antivirus engine but disable it for the IPS - and if so, would you really gain something performancewise as quoting from the above pdf:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;Regardless of which UTM features we enabled - intrusion prevention, antispyware, antivirus, or any combination of these - results were essentially the same as if we'd turned on just one such feature. Simply put, there's no extra performance cost, beyond the initial sharp drop in rates, for layering on multiple types of traffic inspection.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: Changed some text above because disabling DSRI actually enables server response inspection :smileysilly:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2012 08:35:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tweaking-dsri/m-p/23575#M17190</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-11-15T08:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: Tweaking DSRI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tweaking-dsri/m-p/23576#M17191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello mikand&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you check &lt;SPAN style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.paloaltonetworks.com/literature/solution-briefs/tech-partners/arista.pdf" style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #006595;"&gt;http://www.paloaltonetworks.com/literature/solution-briefs/tech-partners/arista.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;site again please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It can not connect website&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Sep 2013 13:18:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tweaking-dsri/m-p/23576#M17191</guid>
      <dc:creator>SilverTiger</dc:creator>
      <dc:date>2013-09-07T13:18:13Z</dc:date>
    </item>
    <item>
      <title>Re: Tweaking DSRI</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tweaking-dsri/m-p/23577#M17192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here you got some updated links regarding Arista using PaloAlto:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Palo Alto Networks and Arista 100 Gbs Next Generation Firewall- Whitepaper&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.aristanetworks.com/media/system/pdf/palo_alto_networks_arista.pdf" title="http://www.aristanetworks.com/media/system/pdf/palo_alto_networks_arista.pdf"&gt;http://www.aristanetworks.com/media/system/pdf/palo_alto_networks_arista.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Palo Alto Networks and Arista Solution Brief&lt;/P&gt;&lt;P&gt;&lt;A href="http://bit.ly/138GEO2" title="http://bit.ly/138GEO2"&gt;http://bit.ly/138GEO2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Arista Scale with Symmetry Guide&lt;/P&gt;&lt;P&gt;&lt;A href="http://bit.ly/138GNBe" title="http://bit.ly/138GNBe"&gt;http://bit.ly/138GNBe&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Arista EOS integration with Palo Alto Networks Next-generation Firewall for 100GbE: Webinar Recording&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.aristanetworks.com/june-27-2013-webinar-recording" title="http://www.aristanetworks.com/june-27-2013-webinar-recording"&gt;http://www.aristanetworks.com/june-27-2013-webinar-recording&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SDN Central, Arista Networks &amp;amp; Palo Alto Networks -DemoFriday: Webinar Recording&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.aristanetworks.com/en/sdn-central-july-2013-webinar-recording" title="http://www.aristanetworks.com/en/sdn-central-july-2013-webinar-recording"&gt;http://www.aristanetworks.com/en/sdn-central-july-2013-webinar-recording&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Sep 2013 21:32:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tweaking-dsri/m-p/23577#M17192</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-09-08T21:32:47Z</dc:date>
    </item>
  </channel>
</rss>

