<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Strange output from Nmap in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26248#M19165</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have PA200 with 5.0.7 with latest updates and I try to nmap scan (from untrust zone) one of my servers from DMZ. Output is strange &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nmap scan report for X.X.X.X&lt;/P&gt;&lt;P&gt;Host is up (0.020s latency).&lt;/P&gt;&lt;P&gt;Not shown: 965 filtered ports&lt;/P&gt;&lt;P&gt;PORT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; STATE SERVICE&lt;/P&gt;&lt;P&gt;21/tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; open&amp;nbsp; ftp&lt;/P&gt;&lt;P&gt;30/tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;80/tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; open&amp;nbsp; http&lt;/P&gt;&lt;P&gt;443/tcp&amp;nbsp;&amp;nbsp; open&amp;nbsp; https&lt;/P&gt;&lt;P&gt;548/tcp&amp;nbsp;&amp;nbsp; open&amp;nbsp; afp&lt;/P&gt;&lt;P&gt;666/tcp&amp;nbsp;&amp;nbsp; open&amp;nbsp; doom&lt;/P&gt;&lt;P&gt;1062/tcp&amp;nbsp; open&amp;nbsp; veracity&lt;/P&gt;&lt;P&gt;1084/tcp&amp;nbsp; open&amp;nbsp; ansoft-lm-2&lt;/P&gt;&lt;P&gt;1110/tcp&amp;nbsp; open&amp;nbsp; nfsd-status&lt;/P&gt;&lt;P&gt;1719/tcp&amp;nbsp; open&amp;nbsp; h323gatestat&lt;/P&gt;&lt;P&gt;1974/tcp&amp;nbsp; open&amp;nbsp; drp&lt;/P&gt;&lt;P&gt;2030/tcp&amp;nbsp; open&amp;nbsp; device2&lt;/P&gt;&lt;P&gt;2525/tcp&amp;nbsp; open&amp;nbsp; ms-v-worlds&lt;/P&gt;&lt;P&gt;2869/tcp&amp;nbsp; open&amp;nbsp; icslap&lt;/P&gt;&lt;P&gt;4045/tcp&amp;nbsp; open&amp;nbsp; lockd&lt;/P&gt;&lt;P&gt;5825/tcp&amp;nbsp; open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;5901/tcp&amp;nbsp; open&amp;nbsp; vnc-1&lt;/P&gt;&lt;P&gt;5902/tcp&amp;nbsp; open&amp;nbsp; vnc-2&lt;/P&gt;&lt;P&gt;6004/tcp&amp;nbsp; open&amp;nbsp; X11:4&lt;/P&gt;&lt;P&gt;6025/tcp&amp;nbsp; open&amp;nbsp; x11&lt;/P&gt;&lt;P&gt;7443/tcp&amp;nbsp; open&amp;nbsp; oracleas-https&lt;/P&gt;&lt;P&gt;8090/tcp&amp;nbsp; open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;8222/tcp&amp;nbsp; open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;9100/tcp&amp;nbsp; open&amp;nbsp; jetdirect&lt;/P&gt;&lt;P&gt;9200/tcp&amp;nbsp; open&amp;nbsp; wap-wsp&lt;/P&gt;&lt;P&gt;9502/tcp&amp;nbsp; open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;10025/tcp open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;10082/tcp open&amp;nbsp; amandaidx&lt;/P&gt;&lt;P&gt;10566/tcp open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;18101/tcp open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;20221/tcp open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;30000/tcp open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;32774/tcp open&amp;nbsp; sometimes-rpc11&lt;/P&gt;&lt;P&gt;44442/tcp open&amp;nbsp; coldfusion-auth&lt;/P&gt;&lt;P&gt;50002/tcp open&amp;nbsp; iiimsf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nmap done: 1 IP address (1 host up) scanned in 6.05 seconds&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually when I did another scan the output was correct or the list of "open ports" is much shorter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the &lt;A href="https://live.paloaltonetworks.com/docs/DOC-3469"&gt;Security Policy Guidelines&lt;/A&gt; configuration should be as :&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-09-24_141650.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/8529_2013-09-24_141650.png" style="width: 620px; height: 36px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-09-24_141826.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/8530_2013-09-24_141826.png" style="width: 620px; height: 42px;" /&gt;&lt;/P&gt;&lt;P&gt;Could You confirm that this is proper behavior of nmap in this situation?&lt;/P&gt;&lt;P&gt;With regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Sep 2013 12:22:03 GMT</pubDate>
    <dc:creator>_slv_</dc:creator>
    <dc:date>2013-09-24T12:22:03Z</dc:date>
    <item>
      <title>Strange output from Nmap</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26248#M19165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have PA200 with 5.0.7 with latest updates and I try to nmap scan (from untrust zone) one of my servers from DMZ. Output is strange &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nmap scan report for X.X.X.X&lt;/P&gt;&lt;P&gt;Host is up (0.020s latency).&lt;/P&gt;&lt;P&gt;Not shown: 965 filtered ports&lt;/P&gt;&lt;P&gt;PORT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; STATE SERVICE&lt;/P&gt;&lt;P&gt;21/tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; open&amp;nbsp; ftp&lt;/P&gt;&lt;P&gt;30/tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;80/tcp&amp;nbsp;&amp;nbsp;&amp;nbsp; open&amp;nbsp; http&lt;/P&gt;&lt;P&gt;443/tcp&amp;nbsp;&amp;nbsp; open&amp;nbsp; https&lt;/P&gt;&lt;P&gt;548/tcp&amp;nbsp;&amp;nbsp; open&amp;nbsp; afp&lt;/P&gt;&lt;P&gt;666/tcp&amp;nbsp;&amp;nbsp; open&amp;nbsp; doom&lt;/P&gt;&lt;P&gt;1062/tcp&amp;nbsp; open&amp;nbsp; veracity&lt;/P&gt;&lt;P&gt;1084/tcp&amp;nbsp; open&amp;nbsp; ansoft-lm-2&lt;/P&gt;&lt;P&gt;1110/tcp&amp;nbsp; open&amp;nbsp; nfsd-status&lt;/P&gt;&lt;P&gt;1719/tcp&amp;nbsp; open&amp;nbsp; h323gatestat&lt;/P&gt;&lt;P&gt;1974/tcp&amp;nbsp; open&amp;nbsp; drp&lt;/P&gt;&lt;P&gt;2030/tcp&amp;nbsp; open&amp;nbsp; device2&lt;/P&gt;&lt;P&gt;2525/tcp&amp;nbsp; open&amp;nbsp; ms-v-worlds&lt;/P&gt;&lt;P&gt;2869/tcp&amp;nbsp; open&amp;nbsp; icslap&lt;/P&gt;&lt;P&gt;4045/tcp&amp;nbsp; open&amp;nbsp; lockd&lt;/P&gt;&lt;P&gt;5825/tcp&amp;nbsp; open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;5901/tcp&amp;nbsp; open&amp;nbsp; vnc-1&lt;/P&gt;&lt;P&gt;5902/tcp&amp;nbsp; open&amp;nbsp; vnc-2&lt;/P&gt;&lt;P&gt;6004/tcp&amp;nbsp; open&amp;nbsp; X11:4&lt;/P&gt;&lt;P&gt;6025/tcp&amp;nbsp; open&amp;nbsp; x11&lt;/P&gt;&lt;P&gt;7443/tcp&amp;nbsp; open&amp;nbsp; oracleas-https&lt;/P&gt;&lt;P&gt;8090/tcp&amp;nbsp; open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;8222/tcp&amp;nbsp; open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;9100/tcp&amp;nbsp; open&amp;nbsp; jetdirect&lt;/P&gt;&lt;P&gt;9200/tcp&amp;nbsp; open&amp;nbsp; wap-wsp&lt;/P&gt;&lt;P&gt;9502/tcp&amp;nbsp; open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;10025/tcp open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;10082/tcp open&amp;nbsp; amandaidx&lt;/P&gt;&lt;P&gt;10566/tcp open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;18101/tcp open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;20221/tcp open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;30000/tcp open&amp;nbsp; unknown&lt;/P&gt;&lt;P&gt;32774/tcp open&amp;nbsp; sometimes-rpc11&lt;/P&gt;&lt;P&gt;44442/tcp open&amp;nbsp; coldfusion-auth&lt;/P&gt;&lt;P&gt;50002/tcp open&amp;nbsp; iiimsf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nmap done: 1 IP address (1 host up) scanned in 6.05 seconds&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually when I did another scan the output was correct or the list of "open ports" is much shorter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the &lt;A href="https://live.paloaltonetworks.com/docs/DOC-3469"&gt;Security Policy Guidelines&lt;/A&gt; configuration should be as :&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-09-24_141650.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/8529_2013-09-24_141650.png" style="width: 620px; height: 36px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2013-09-24_141826.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/8530_2013-09-24_141826.png" style="width: 620px; height: 42px;" /&gt;&lt;/P&gt;&lt;P&gt;Could You confirm that this is proper behavior of nmap in this situation?&lt;/P&gt;&lt;P&gt;With regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Sep 2013 12:22:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26248#M19165</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-09-24T12:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: Strange output from Nmap</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26249#M19166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have those ports listening on your server, the firewall will not immediately block the 3-way TCP handshake. With the default nmap settings, it's just establishing a TCP handshake, not actually doing an in-depth analysis like a penetration test where actual requests are sent. Thus, the firewall does not know what application the handshake is within those first 3 packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the test were to include, say, an HTTP GET request, the majority of those ports would not show as open at that stage. Even more in-depth penetration testing involving requests and responses would filter even more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Greg Wesson&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Sep 2013 22:57:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26249#M19166</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-09-24T22:57:12Z</dc:date>
    </item>
    <item>
      <title>Re: Strange output from Nmap</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26250#M19167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm, but in his policy he has configured service "application-default" which should limit communication to the standard ports of the protocol, eg. ssl = 443, web-browsing = 80 etc. However I tend to use only ports not apps for inbound traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Sep 2013 06:54:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26250#M19167</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2013-09-25T06:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: Strange output from Nmap</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26251#M19168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/4124"&gt;gafrol&lt;/A&gt; that's true when the session begins, such as with an HTTP GET or an FTP command. But with just the 3-way handshake the firewall has no way of knowing what the application is. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The security policy is matched twice per initial packet: Once if a policy would allow the traffic if there were no applications selected, and again when the application is determined. If this was the only rule in the policy (something that's not clear from the screenshot), then it would make sense that it should be blocked as it is not the default app for those ports. I think there is probably a rule above or below that, if there was no application, would allow the traffic to the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Sep 2013 17:30:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26251#M19168</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-09-25T17:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: Strange output from Nmap</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26252#M19169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/11884"&gt;gwesson&lt;/A&gt; this is only rule in security policy that are applied to traffic from untrust to DMZ for this particular host in DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You for explaining us these problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Sep 2013 18:21:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26252#M19169</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2013-09-25T18:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: Strange output from Nmap</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26253#M19170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As a test, I set up something similar with a server I have running behind my test firewall. The server is listening on 22, 25, 80, 443, 4443, and 5001, and I set up the same policy as you, except I also added a rule right below that one that denies all traffic to that IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I run nmap on that system, it gives me the following (I obfuscated the names since it's my personal server):&lt;/P&gt;&lt;P&gt;&lt;EM&gt;~ $ nmap x.x.x.x&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Starting Nmap 6.00 ( &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://nmap.org"&gt;http://nmap.org&lt;/A&gt;&lt;SPAN&gt; ) at 2013-09-25 12:26 PDT&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Nmap scan report for x-x-x-x.abc.def.example.com (x.x.x.x)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Host is up (0.027s latency).&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Not shown: 997 filtered ports&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;PORT&amp;nbsp;&amp;nbsp;&amp;nbsp; STATE&amp;nbsp; SERVICE&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;21/tcp&amp;nbsp; closed ftp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;80/tcp&amp;nbsp; open&amp;nbsp;&amp;nbsp; http&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;443/tcp open&amp;nbsp;&amp;nbsp; https&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Nmap done: 1 IP address (1 host up) scanned in 4.03 seconds&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see from that, it is only showing the services defined in my allow rule with application_default as the service. When I delete the rule below the allow rule (the one that blocks everything else), my other rules allow all the configured ports to reply. Here's the output when I add the "application_default" rule:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Not shown: 994 filtered ports&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;PORT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; STATE&amp;nbsp; SERVICE&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;21/tcp&amp;nbsp;&amp;nbsp; closed ftp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;25/tcp&amp;nbsp;&amp;nbsp; open&amp;nbsp;&amp;nbsp; smtp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;80/tcp&amp;nbsp;&amp;nbsp; open&amp;nbsp;&amp;nbsp; http&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;443/tcp&amp;nbsp; open&amp;nbsp;&amp;nbsp; https&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;5001/tcp open&amp;nbsp;&amp;nbsp; commplex-link&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;8080/tcp closed http-proxy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nmap done: 1 IP address (1 host up) scanned in 4.53 seconds&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And with my default rule set:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Not shown: 994 filtered ports&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;PORT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; STATE&amp;nbsp; SERVICE&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;22/tcp&amp;nbsp;&amp;nbsp; open&amp;nbsp;&amp;nbsp; ssh&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;25/tcp&amp;nbsp;&amp;nbsp; open&amp;nbsp;&amp;nbsp; smtp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;80/tcp&amp;nbsp;&amp;nbsp; open&amp;nbsp;&amp;nbsp; http&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;4443/tcp open&amp;nbsp;&amp;nbsp; pharos&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;5001/tcp open&amp;nbsp;&amp;nbsp; commplex-link&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;8080/tcp closed http-proxy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Nmap done: 1 IP address (1 host up) scanned in 5.89 seconds&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing you'll notice is that with your test rule in place, port 21 is explicitly reset (showing closed). When that rule is gone, the port 21 traffic is just dropped since I don't have that port listening on the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Sep 2013 19:37:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26253#M19170</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-09-25T19:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Strange output from Nmap</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26254#M19171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wonder if this really is true?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the slides for how packets are being processed by PA the first check is to look at ip and ports. If there are no security rules matching this criteria the packet is imediately dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is if you for example only has a single allow rule "app: web-browsing" with "service: application-default" and application-default for web-browsing would mean (example) TCP80 and TCP8080. Then if a packet arrives to the PA matching this rule (regarding incoming/outgoing zone) this packet will be dropped (assuming your rules is to allow traffic with a last rule to drop anything else) UNLESS the dstport was TCP80 or TCP8080 (in this particular example). That is having a last rule which block and log through "any any deny".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the 3-way handshake is performed and depending on application PA could drop the first packet AFTER the handshake is performed or it will take a few more packets before PA knows what appid it is (depending on which appid you wish to allow/block).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However as your test points out there is a last hidden rule (well rules) that for example will allow intrazone traffic etc. As a best practice I always recommend admins to ALWAYS put a last (manual) rule in order to block (and log) "any any deny". The default (hidden) last rules is probably what causes the PA to somewhat incorrectly (or at least undesired) allow traffic through which shouldnt be allowed through (and is taken care of if you setup a manual last rule to block and log).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 09:47:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26254#M19171</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-09-30T09:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: Strange output from Nmap</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26255#M19172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/3245"&gt;mikand&lt;/A&gt; - You're absolutely correct about the deny happening if there are no other rules to allow the traffic. If no rule matches a port to allow the traffic, it will be denied. I suspect that a review of the full security policy will show what is happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the manual rule at the end, it can cause significant trouble if implemented incorrectly. I have often run into things like GlobalProtect failing because the initial Portal request is same-zone, but an any-any-deny rule would block that traffic. We recommend against the default rule at the bottom since the firewall already blocks inter-zone traffic. There's a CLI logging option if you want to log that traffic (up to 5 minutes at a time) to do any rule-based troubleshooting:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: Calibri, sans-serif;"&gt;set system setting logging default-policy-logging &amp;lt;0-300sec&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This lets you check for default deny hits without logging everything all the time, or denying traffic unexpectedly. For customers who must log all denies, I recommend instead of a generic any-any-deny to put in inter-zone specific denies:&lt;/P&gt;&lt;P&gt;From External; to [internal/vpn/dmz]; deny&lt;/P&gt;&lt;P&gt;From Internal; to [External/vpn/dmz]; deny&lt;/P&gt;&lt;P&gt;From dmz; to [Internal/vpn/external]; deny&lt;/P&gt;&lt;P&gt;From vpn; to [internal/dmz/external]; deny&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This lets the logging take place, and mimics the default behavior by allowing same-zone traffic. Your mileage may vary, it's just an observation &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 17:04:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/strange-output-from-nmap/m-p/26255#M19172</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2013-09-30T17:04:12Z</dc:date>
    </item>
  </channel>
</rss>

