<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic GRE protocol traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/gre-protocol-traffic/m-p/2544#M1896</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello to All, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I noticed some strange behavior regarding GRE protocol, and try to explain what exactly is strange:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customer has unfortunate GRE VPN tunnel and in one policy "Public_ulaz_GRE" they stated to pass only GRE and NVGRE protocol respectively. (following picture)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="gre_policy.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10356_gre_policy.jpg" style="width: 620px; height: 23px;" /&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;But, when you filter traffic by mentioned policy, you can see that beside legitimate, bunch of non-gre traffic are allowed by this policy!??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="gre_filter.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10357_gre_filter.jpg" style="width: 620px; height: 253px;" /&gt;&lt;/P&gt;&lt;P&gt;Is someone have reasonable explanation for this behavior?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tician&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Dec 2013 11:49:29 GMT</pubDate>
    <dc:creator>Tician</dc:creator>
    <dc:date>2013-12-17T11:49:29Z</dc:date>
    <item>
      <title>GRE protocol traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gre-protocol-traffic/m-p/2544#M1896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello to All, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I noticed some strange behavior regarding GRE protocol, and try to explain what exactly is strange:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customer has unfortunate GRE VPN tunnel and in one policy "Public_ulaz_GRE" they stated to pass only GRE and NVGRE protocol respectively. (following picture)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="gre_policy.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10356_gre_policy.jpg" style="width: 620px; height: 23px;" /&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;But, when you filter traffic by mentioned policy, you can see that beside legitimate, bunch of non-gre traffic are allowed by this policy!??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="gre_filter.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/10357_gre_filter.jpg" style="width: 620px; height: 253px;" /&gt;&lt;/P&gt;&lt;P&gt;Is someone have reasonable explanation for this behavior?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tician&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Dec 2013 11:49:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gre-protocol-traffic/m-p/2544#M1896</guid>
      <dc:creator>Tician</dc:creator>
      <dc:date>2013-12-17T11:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: GRE protocol traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gre-protocol-traffic/m-p/2545#M1897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tician,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Yes this is expected if &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;"Public_ulaz_GRE"&lt;/SPAN&gt; lies at the top of your security rules .&amp;nbsp; Before the 3-way handshake completes and the session's application is detected as incomplete/in-sufficient data, the security policy lookup for the session will match the first security policy which matches all attributes except application.&amp;nbsp; Once the 3-way handshake completes and the firewall sees a data packet which can be used to identify the app the session will shift the application to the appropriate value and do another security policy lookup.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Because the application is not known, when the SYN packet is received, the application portion of the security policies can not be applied.&amp;nbsp; As a result, the security policy lookup is performed against the 6 tuples of the session, source and destination IP and port, ingress interface (actually zone) and protocol.&amp;nbsp; The first policy which matches these 6 tuples will be used to allow the SYN and any additional packets that traverse the firewall before the application is identified.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Hope that helps!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Thanks and regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Kunal Adak&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Dec 2013 17:22:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gre-protocol-traffic/m-p/2545#M1897</guid>
      <dc:creator>kadak</dc:creator>
      <dc:date>2013-12-17T17:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: GRE protocol traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gre-protocol-traffic/m-p/2546#M1898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kunal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes this is very helpful answer, thank you...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Dec 2013 23:28:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gre-protocol-traffic/m-p/2546#M1898</guid>
      <dc:creator>Tician</dc:creator>
      <dc:date>2013-12-17T23:28:49Z</dc:date>
    </item>
  </channel>
</rss>

