<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VM-100 responding with SYNACK on all ports in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66791#M39323</link>
    <description>&lt;P&gt;Hi Raido,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I do a nmap of a webserver in the same zone and subnet then nmap returns 'normal' results (i.e. only the ports that are really open are reported as open, ports that are really closed are reported as closed.). &amp;nbsp;However, when I do this, traffic isn't flowing through the PA VM-100 (i.e. because it's in the same subnet it doesn't hit the default gateway - the firewall).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had the same thought that it could have been caused from service=any rather than servce=application-default in one of the security rules. &amp;nbsp;In my security rules I did have a few instances of service=any. &amp;nbsp;For the purposes of troubleshooting I changed all those rules to application-default but the nmap scan kept saying all ports were open.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also created a new security rule at the very top of the list with: source_zone=trust, dest_zone=untrust, dest_ip=serverA, application=any,service=application-default,action=allow,profile_type=none which I thought would override any problem security policies, but it didn't change the behavior, the nmap scan showed it still responding on all ports.&lt;/P&gt;</description>
    <pubDate>Sun, 18 Oct 2015 10:58:05 GMT</pubDate>
    <dc:creator>aisherwood</dc:creator>
    <dc:date>2015-10-18T10:58:05Z</dc:date>
    <item>
      <title>VM-100 responding with SYNACK on all ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66785#M39321</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've got an evaluation of the VM-100 (v7.0.2) setup, but I'm finding that for some reason the firewall appears to be intercepting requests and completing a TCP 3-way handshake, regardless if the ultimate destination has the port open or not. Has anyone got any idea if this is normal behaviour, or if I've miss-configured something somewhere (and if so, what specifically I need to do to undo it?)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Steps to replicate:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;1. Configure VM-100 as follows:&lt;BR /&gt;&lt;STRONG&gt;NETWORK INTERFACES&lt;/STRONG&gt;&lt;BR /&gt;Interface: ethernet1/1&lt;BR /&gt;Interface Type: Layer3&lt;/P&gt;
&lt;P&gt;Virtual Router: default&lt;/P&gt;
&lt;P&gt;Zone: trust&lt;BR /&gt;IP: 192.168.0.1/24&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Interface: ethernet1/2&lt;BR /&gt;Interface Type: Layer3&lt;/P&gt;
&lt;P&gt;Virtual Router: default&lt;/P&gt;
&lt;P&gt;Zone: untrust&lt;BR /&gt;IP: 192.168.100.5/24&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;VIRTUAL ROUTERS&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Name: default&lt;/P&gt;
&lt;P&gt;Interfaces: ethernet1/1, ethernet1/2&lt;/P&gt;
&lt;P&gt;Static Route&lt;/P&gt;
&lt;P&gt;Name: default-route&lt;/P&gt;
&lt;P&gt;Destination: 0.0.0.0/0&lt;/P&gt;
&lt;P&gt;Interface: ethernet1/2&lt;/P&gt;
&lt;P&gt;Next Hop: IP Address - 192.168.100.1&lt;/P&gt;
&lt;P&gt;Metric: 10&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;NAT POLICIES&lt;/STRONG&gt;&lt;BR /&gt;Source Zone: trust&lt;BR /&gt;Destination Zone: untrust&lt;BR /&gt;Destination Interface: ethernet1/2&lt;BR /&gt;Service: any&lt;BR /&gt;Source Address: any&lt;BR /&gt;Destination Address: any&lt;BR /&gt;Translation Type: Dynamic IP and Port&lt;BR /&gt;Address Type: Interface Address&lt;BR /&gt;Interface: ethernet1/2&lt;BR /&gt;IP address: 192.168.100.5/24&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;2. On the Internet (untrust zone) setup a webserver 'ServerA' and configure the host firewall to have TCP port 80 open, but all other ports (e.g. 1-79 and 81-65536) closed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. On the local network &amp;nbsp;(trust zone) &amp;nbsp;setup a Windows computer 'WorkstationB' perform a nmap 'Quick Scan' with a target of 'ServerA'&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;FONT size="4"&gt;Expected Behavior:&lt;/FONT&gt;&lt;BR /&gt;nmap reports that port 80 is open, and all other ports closed/filtered.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;FONT size="4"&gt;Actual Behavior:&lt;/FONT&gt;&lt;BR /&gt;nmap reports that TCP ports 7, 9, 13, 21, 22, 23, 25, 25, 37, 53, 79, 80, 81, 88, 106, ... [cut]..., 49516, 49157 are all open.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The same thing happens if you attempt a nmap in the other direction &amp;nbsp;(e.g. run the scan on ServerA targeting the ethernet1/2 interface on the firewall - nmap returns all ports open, even though in reality only a couple of ports have a NAT rule configured to do destination address translation).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We've got a 7050 at work and it doesn't exhibit this behaviour (i.e. if the destination port is closed, there will be no SYNACK packet sent back to the source and the 3-way TCP handshake never completes). I'm not sure if this is because I've miss-configured something on the VM side, or because the virtual and hardware appliance functions differently.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All of this isn't a problem as such, the Internet still works just fine and servers in the trust zone accessed from untrust with a destination address NAT rule operate normally - it's just really confusing when I'm trying to troubleshoot problems and are not able to figure out if a destination address has a particular TCP port open.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone got any thoughts?&lt;/P&gt;</description>
      <pubDate>Sun, 18 Oct 2015 06:42:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66785#M39321</guid>
      <dc:creator>aisherwood</dc:creator>
      <dc:date>2015-10-18T06:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: VM-100 responding with SYNACK on all ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66786#M39322</link>
      <description>&lt;P&gt;If you put web server and nmap into same zone and same subnet and scan then do you see similar &amp;nbsp;behaviour (same ports send syn ack)?&lt;/P&gt;
&lt;P&gt;If you configure security policy:&lt;/P&gt;
&lt;P&gt;"from trust zone" to "untrust zone" and "application is web-browsing" and "port is any"&lt;/P&gt;
&lt;P&gt;Then Palo allows web browsing on any port.&lt;/P&gt;
&lt;P&gt;This means that TCP 3 way handshake (syn, syn-ack and ack) will be permitted by firewall, HTTP GET will be permitted by firewall and then based on server response firewall can decide if it is web browsing or not.&lt;/P&gt;
&lt;P&gt;So you should create rule where instead of "service = any" you choose "application-default" or specify service by port number.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Oct 2015 08:03:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66786#M39322</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2015-10-18T08:03:34Z</dc:date>
    </item>
    <item>
      <title>Re: VM-100 responding with SYNACK on all ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66791#M39323</link>
      <description>&lt;P&gt;Hi Raido,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I do a nmap of a webserver in the same zone and subnet then nmap returns 'normal' results (i.e. only the ports that are really open are reported as open, ports that are really closed are reported as closed.). &amp;nbsp;However, when I do this, traffic isn't flowing through the PA VM-100 (i.e. because it's in the same subnet it doesn't hit the default gateway - the firewall).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had the same thought that it could have been caused from service=any rather than servce=application-default in one of the security rules. &amp;nbsp;In my security rules I did have a few instances of service=any. &amp;nbsp;For the purposes of troubleshooting I changed all those rules to application-default but the nmap scan kept saying all ports were open.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also created a new security rule at the very top of the list with: source_zone=trust, dest_zone=untrust, dest_ip=serverA, application=any,service=application-default,action=allow,profile_type=none which I thought would override any problem security policies, but it didn't change the behavior, the nmap scan showed it still responding on all ports.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Oct 2015 10:58:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66791#M39323</guid>
      <dc:creator>aisherwood</dc:creator>
      <dc:date>2015-10-18T10:58:05Z</dc:date>
    </item>
    <item>
      <title>Re: VM-100 responding with SYNACK on all ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66792#M39324</link>
      <description>&lt;P&gt;Do you have zone protection profile set with syn-cookies?&lt;/P&gt;</description>
      <pubDate>Sun, 18 Oct 2015 12:27:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66792#M39324</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2015-10-18T12:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: VM-100 responding with SYNACK on all ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66793#M39325</link>
      <description>&lt;P&gt;What you can do is to enable packet capture on firewall.&lt;/P&gt;
&lt;P&gt;Log receive and transmit.&lt;/P&gt;
&lt;P&gt;Check if those syn packets pass firewall (are received and transmitted) and if syn-ack is received from web server and transmitted further by fw.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Oct 2015 12:27:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66793#M39325</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2015-10-18T12:27:26Z</dc:date>
    </item>
    <item>
      <title>Re: VM-100 responding with SYNACK on all ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66794#M39326</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you see anything in traffic log?&lt;/P&gt;
&lt;P&gt;Application in those sessions should be "incomplete"&lt;/P&gt;
&lt;P&gt;Click on magnifing glass and you see what rule permitted this traffic through.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Oct 2015 12:31:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66794#M39326</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2015-10-18T12:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: VM-100 responding with SYNACK on all ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66837#M39337</link>
      <description>&lt;P&gt;The IP address in the NAT policy has probably the wrong subnet mask:&amp;nbsp;&lt;SPAN&gt;IP address: 192.168.100.5/24&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;You should use /32 here, not /24. The firewall is doing proxy arp for the whole subnet&amp;nbsp;&lt;SPAN&gt;192.168.100.0/24&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2015 13:11:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66837#M39337</guid>
      <dc:creator>Anon1</dc:creator>
      <dc:date>2015-10-19T13:11:39Z</dc:date>
    </item>
    <item>
      <title>Re: VM-100 responding with SYNACK on all ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66838#M39338</link>
      <description>&lt;P&gt;It must be SYN cookie functionality.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2015 13:27:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66838#M39338</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2015-10-19T13:27:16Z</dc:date>
    </item>
    <item>
      <title>Re: VM-100 responding with SYNACK on all ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66979#M39391</link>
      <description>&lt;P&gt;I did have a zone protection profile set, but I've disabled it for troubleshooting purposes (and in any regards, syn-cookies didn't appear to be enabled in it). I've got no DoS Protection profiles either.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried running a packet capture and the results were interesting. When capturing on ethernet1/2 (untrust) I can see syn-ack packets from the target server in the packet capture which seems to suggest the server really is replying -- however, if I do the same nmap scan to a completely made up IP like 1.2.3.4 I also see syn-ack replies - so whilst they're in the captures, they can't be from the real source IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Traffic logs list the session as 'incomplete'.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In regards to the NAT policy, I had it configured the policy via the PA web GUI, and that IP was actually selected from a drop-down list of valid addresses and not me entering it directly (i.e. so I couldn't select /32 even if I wanted to). To simplify the rule I removed the IP address entirely so now it's just:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NAT POLICIES&lt;BR /&gt;Source Zone: trust&lt;BR /&gt;Destination Zone: untrust&lt;BR /&gt;Destination Interface: any&lt;BR /&gt;Service: any&lt;BR /&gt;Source Address: any&lt;BR /&gt;Destination Address: any&lt;BR /&gt;Translation Type: Dynamic IP and Port&lt;BR /&gt;Address Type: Interface Address&lt;BR /&gt;Interface: ethernet1/2&lt;BR /&gt;IP address: none&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there anywhere else where syn-cookies could be configured that I've missed or got any other suggestions?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/833i51B1A84082B209AF/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="synack.PNG" title="synack.PNG" /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2015 10:21:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vm-100-responding-with-synack-on-all-ports/m-p/66979#M39391</guid>
      <dc:creator>aisherwood</dc:creator>
      <dc:date>2015-10-21T10:21:42Z</dc:date>
    </item>
  </channel>
</rss>

