<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pros vs Cons with PAN? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pros-vs-cons-with-pan/m-p/50482#M37170</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess it would be a bit biased to ask for Pros vs Cons of PAN in the supportforum of PAN &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; but I recently stumbled upon an article (which I wish to share) regarding PAN which I think might be of interrest for most of us in this forum:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cymbel.com/blog/a-response-to-stiennon-analysis-of-palo-alto-networks/"&gt;http://www.cymbel.com/blog/a-response-to-stiennon-analysis-of-palo-alto-networks/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another link (or links) is from a presentation held at Defcon 19 last year made by Brad Woodberg (Security Product Line Engineer) at Juniper Networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;www.youtube.com/watch?v=s2cz--bzZRE&lt;BR /&gt;DEFCON 19: Network Application Firewalls: Exploits and Defense&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.youtube.com/watch?v=G8U-1J4SI4o"&gt;http://www.youtube.com/watch?v=G8U-1J4SI4o&lt;/A&gt;&lt;BR /&gt;DEFCON 19: Network Application Firewalls: Exploits and Defense ( w speaker)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think most of us will recognise that the product he is mostly speaking about and from which the screenshots are from is a PaloAlto unit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess many of the claims is biased in some way or another (like not enabling threat preventation for the first occurance of rpc within a http request and ignoring results from NSS Labs regarding their IDP tests) but what caught my attention is around 25 minutes into the presentation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone in here with some more information regarding the claimed "application cache poisoning"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it a particular configuration that Brad used to be able to accomplish the result (which should be avoided) or is it some bug or even specific hardware (like PA-500 or such) which will bring you the (undesired) result (and in case it was a bug, for which version was it fixed - to be compared to the AET bug discovered by NSS Labs which Brad just briefly mentioned has already been taken care of (after speaking about 5 minutes of that vuln which no longer exists in case of PAN but might exist for other vendors))?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 May 2012 23:25:49 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-05-08T23:25:49Z</dc:date>
    <item>
      <title>Pros vs Cons with PAN?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pros-vs-cons-with-pan/m-p/50482#M37170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess it would be a bit biased to ask for Pros vs Cons of PAN in the supportforum of PAN &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; but I recently stumbled upon an article (which I wish to share) regarding PAN which I think might be of interrest for most of us in this forum:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cymbel.com/blog/a-response-to-stiennon-analysis-of-palo-alto-networks/"&gt;http://www.cymbel.com/blog/a-response-to-stiennon-analysis-of-palo-alto-networks/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another link (or links) is from a presentation held at Defcon 19 last year made by Brad Woodberg (Security Product Line Engineer) at Juniper Networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;www.youtube.com/watch?v=s2cz--bzZRE&lt;BR /&gt;DEFCON 19: Network Application Firewalls: Exploits and Defense&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.youtube.com/watch?v=G8U-1J4SI4o"&gt;http://www.youtube.com/watch?v=G8U-1J4SI4o&lt;/A&gt;&lt;BR /&gt;DEFCON 19: Network Application Firewalls: Exploits and Defense ( w speaker)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think most of us will recognise that the product he is mostly speaking about and from which the screenshots are from is a PaloAlto unit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess many of the claims is biased in some way or another (like not enabling threat preventation for the first occurance of rpc within a http request and ignoring results from NSS Labs regarding their IDP tests) but what caught my attention is around 25 minutes into the presentation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone in here with some more information regarding the claimed "application cache poisoning"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it a particular configuration that Brad used to be able to accomplish the result (which should be avoided) or is it some bug or even specific hardware (like PA-500 or such) which will bring you the (undesired) result (and in case it was a bug, for which version was it fixed - to be compared to the AET bug discovered by NSS Labs which Brad just briefly mentioned has already been taken care of (after speaking about 5 minutes of that vuln which no longer exists in case of PAN but might exist for other vendors))?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 23:25:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pros-vs-cons-with-pan/m-p/50482#M37170</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-05-08T23:25:49Z</dc:date>
    </item>
    <item>
      <title>Re: Pros vs Cons with PAN?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pros-vs-cons-with-pan/m-p/50483#M37171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is very interesting , could someone from Palo comment on this post ?&amp;nbsp; There is setting "set application cache no". I am not sure that the default setting is. I would expect application cache to be disabled after running this command and should cause it to identify the application shift. But I has assumed Palo did not do Apllication caching by default and would detect Application shifts by default. The other aspect about this video that concerns me is DNS over a random port being detected as unknown-UDP. I have just set application cache to "no" on my firewall and going to check the what kind of performance or cpu load on the dataplane is seen.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 09:18:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pros-vs-cons-with-pan/m-p/50483#M37171</guid>
      <dc:creator>sunilsadanandan</dc:creator>
      <dc:date>2012-05-10T09:18:33Z</dc:date>
    </item>
  </channel>
</rss>

