<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: About non-syn-tcp option in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/about-non-syn-tcp-option/m-p/36408#M26764</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I understand PAN-OS_4.1_CLI_Reference_Guide.pdf when you enable tcp-reject-non-syn (which is enabled by default if im not mistaken) a new session will only be allowed if the first packet seen is a syn (for tcp traffic).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will break stuff if you have asymetric routing or for some other reason will involve a PA box in an already established flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By setting tcp-reject-non-syn to no you will allow the PA to setup a new (tcp) flow even if the first packet that hit your PA isnt a syn (one could argue that by allowing (tcp) flows to establish even without initial handshake you will in some way open up for some attacks to bypass your firewall). This can also be bad for performance reasons where someone from internet could send just bogus packets to your firewall and make it eat up all its sessiontables (compared to when a syn is needed, the attacker would then be limited to actually use syn as first packets for tcp traffic).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 May 2012 08:28:13 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-05-10T08:28:13Z</dc:date>
    <item>
      <title>About non-syn-tcp option</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-non-syn-tcp-option/m-p/36407#M26763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello guys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you know that PAN has got a option of session that non-syn-tcp.&lt;/P&gt;&lt;P&gt;I have a question about non-syn-tcp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When reject non-SYN first packet was false (when non-syn-tcp was not dropeed) and non-syn-tcp session already establised throught PAN device If non-syn-tcp option were changed to true that makes drop session that established non-syn-tcp session?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it used command of configureation mode "set deviceconfig setting session tcp-reject-non-syn yes | commit", that makes drop also established non-syn-tcp session?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Roh.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 06:41:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-non-syn-tcp-option/m-p/36407#M26763</guid>
      <dc:creator>ttongfly</dc:creator>
      <dc:date>2012-05-10T06:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: About non-syn-tcp option</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-non-syn-tcp-option/m-p/36408#M26764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I understand PAN-OS_4.1_CLI_Reference_Guide.pdf when you enable tcp-reject-non-syn (which is enabled by default if im not mistaken) a new session will only be allowed if the first packet seen is a syn (for tcp traffic).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will break stuff if you have asymetric routing or for some other reason will involve a PA box in an already established flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By setting tcp-reject-non-syn to no you will allow the PA to setup a new (tcp) flow even if the first packet that hit your PA isnt a syn (one could argue that by allowing (tcp) flows to establish even without initial handshake you will in some way open up for some attacks to bypass your firewall). This can also be bad for performance reasons where someone from internet could send just bogus packets to your firewall and make it eat up all its sessiontables (compared to when a syn is needed, the attacker would then be limited to actually use syn as first packets for tcp traffic).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 08:28:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-non-syn-tcp-option/m-p/36408#M26764</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-05-10T08:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: About non-syn-tcp option</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-non-syn-tcp-option/m-p/36409#M26765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I use the command &lt;EM&gt;set deviceconfig setting session tcp-reject-non-syn no&lt;/EM&gt; (default yes) only when doing a POC and inserting the fw in vwire mode. In this case previous established sessions continue without having AS400 users screaming all arount having lost connection &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In normal operations I let on "yes" in order to avoid secuirtyy and performace issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 12:07:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-non-syn-tcp-option/m-p/36409#M26765</guid>
      <dc:creator>NGS_SOC</dc:creator>
      <dc:date>2012-05-10T12:07:29Z</dc:date>
    </item>
  </channel>
</rss>

