<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability in TCP packet in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-tcp-packet/m-p/5109#M3758</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PANFW can act upon malicious TCP packets ( used for port scans and&amp;nbsp; reconnaisance ) using the zone protection profile as shown below. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="zone protection-2.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7921_zone protection-2.JPG.jpg" style="width: 620px; height: 412px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="zone protection-1.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7922_zone protection-1.JPG.jpg" style="width: 620px; height: 288px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;As I understand the zone protection is for incoming traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;That is if you want to protect DMZ then you should apply your zone-protection on the Untrust zone (facing Internet) and the Trust zone (facing your LAN - if you wish to protect from inside threats aswell (for example an overtaken client is being used to DDoS/DoS your DMZ devices)).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Aug 2013 15:25:20 GMT</pubDate>
    <dc:creator>kprakash</dc:creator>
    <dc:date>2013-08-27T15:25:20Z</dc:date>
    <item>
      <title>Vulnerability in TCP packet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-tcp-packet/m-p/5106#M3755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible for PAN to block asynchronous tcp and RST packets to prevent attack ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bryan &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Aug 2013 05:57:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-tcp-packet/m-p/5106#M3755</guid>
      <dc:creator>bryanpascal</dc:creator>
      <dc:date>2013-08-27T05:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in TCP packet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-tcp-packet/m-p/5107#M3756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you try with Security profile configured on security rule ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Aug 2013 10:04:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-tcp-packet/m-p/5107#M3756</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-08-27T10:04:05Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in TCP packet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-tcp-packet/m-p/5108#M3757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi...By asynchronous, I assume you mean TCP packets that do not follow the TCP 3-way handshake.&amp;nbsp; The default behavior of the PA is to perform stateful inspection and will drop packets that did not conform to the 3-way TCP handshake.&amp;nbsp; Here's how to enable/disable this feature: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-3196"&gt;How to Set the Firewall to Reject non-Syn First Packet?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Aug 2013 14:01:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-tcp-packet/m-p/5108#M3757</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2013-08-27T14:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in TCP packet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-tcp-packet/m-p/5109#M3758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PANFW can act upon malicious TCP packets ( used for port scans and&amp;nbsp; reconnaisance ) using the zone protection profile as shown below. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="zone protection-2.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7921_zone protection-2.JPG.jpg" style="width: 620px; height: 412px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="zone protection-1.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7922_zone protection-1.JPG.jpg" style="width: 620px; height: 288px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;As I understand the zone protection is for incoming traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;That is if you want to protect DMZ then you should apply your zone-protection on the Untrust zone (facing Internet) and the Trust zone (facing your LAN - if you wish to protect from inside threats aswell (for example an overtaken client is being used to DDoS/DoS your DMZ devices)).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Aug 2013 15:25:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-in-tcp-packet/m-p/5109#M3758</guid>
      <dc:creator>kprakash</dc:creator>
      <dc:date>2013-08-27T15:25:20Z</dc:date>
    </item>
  </channel>
</rss>

