<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RSH session issue passing through the Palo Alto in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90443#M43574</link>
    <description>&lt;P&gt;My guess it will not work as FTP, because it seems like Palo Alto does not have ALG for RSH.&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/app-id/application-level-gateways" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/app-id/application-level-gateways&lt;/A&gt;&lt;/P&gt;&lt;P&gt;So reverse connection will not be opened automatically - NAT and security rules have to be in place. If you have that, try splitting NAT into two rules (do not use bidirectional), I stumbled upon strange behaviour of bidirectional rule once, but dunno if it the real problem.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also try using CLI with &lt;EM&gt;#test&amp;nbsp;nat-policy-match&lt;/EM&gt; and &lt;EM&gt;#test&amp;nbsp;security-policy-match&lt;/EM&gt; to make sure the traffic is hitting it should be hitting. If it is not - check the rules. I think at least&amp;nbsp;RSH should work without decryption in place.&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jun 2016 13:44:59 GMT</pubDate>
    <dc:creator>nikoo</dc:creator>
    <dc:date>2016-06-21T13:44:59Z</dc:date>
    <item>
      <title>RSH session issue passing through the Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90387#M43566</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interesting one.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1x2.1x4.1x4.1x5 makes an initial connection using RSH the 192.168.0.20 then creates a separate RSH session back to the&amp;nbsp;originating&amp;nbsp;server but this always fails as the Palo seems to ignore the rule and NAT that is in place for this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions/advises are welcome.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 11:04:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90387#M43566</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-06-22T11:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: RSH session issue passing through the Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90399#M43569</link>
      <description>&lt;P&gt;Have not worked with RSH but assuming that reverse connection ports are communicated in the beginning of session (similar to FTP) and this session is not decrypted on firewall (you are not doing SSH proxy) then how should Palo know what ports to open for return traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 12:20:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90399#M43569</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2016-06-21T12:20:37Z</dc:date>
    </item>
    <item>
      <title>Re: RSH session issue passing through the Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90406#M43570</link>
      <description>&lt;P&gt;Hi Raido,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Correct. This session is similar to the FTP session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Server in Management LAN ( 1x2.1x4.1x4.1x5) initiates a RSH session (port 514) to &amp;nbsp;the 192.168.2.80 server. They agree another port for return (example tcp port 707). 192.168.2.80 opens a new session to the Server in Management LAN on agreed port.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Details of traffic:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Incoming from 1x2.1x4.1x4.1x5&amp;nbsp;to 1x2.1x4.1x9.2x2 using RSH&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;(Management) 1x2.1x4.1x4.1x5 (rsh 514) ----&amp;gt; 1x2.1x4.1x9.2x2 Bidirectional NAT ----&amp;gt; (NPS)192.168.2.80&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Outgoing from 192.168.2.80 to 1x2.1x4.1x4.1x5 response to initial packet above connects back to authenticate on agreed port using RSH&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;(NPS) 192.168.2.80 (rsh 512-1023) ----&amp;gt; Bidirectional NAT 1x2.1x4.1x9.2x2 ----&amp;gt; 1x2.1x4.1x4.1x5 (Management)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 12:38:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90406#M43570</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-06-21T12:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: RSH session issue passing through the Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90423#M43571</link>
      <description>&lt;P&gt;NAT is not enough.&lt;/P&gt;&lt;P&gt;Security policy will probably take this traffic down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try to create allow any any from&amp;nbsp;&lt;SPAN&gt;192.168.2.80 to management LAN PC that initiates connection.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If it works then remove this any any rule and set up SSH proxy under decyption tab and test if it keeps on working.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 13:06:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90423#M43571</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2016-06-21T13:06:06Z</dc:date>
    </item>
    <item>
      <title>Re: RSH session issue passing through the Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90443#M43574</link>
      <description>&lt;P&gt;My guess it will not work as FTP, because it seems like Palo Alto does not have ALG for RSH.&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/app-id/application-level-gateways" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/app-id/application-level-gateways&lt;/A&gt;&lt;/P&gt;&lt;P&gt;So reverse connection will not be opened automatically - NAT and security rules have to be in place. If you have that, try splitting NAT into two rules (do not use bidirectional), I stumbled upon strange behaviour of bidirectional rule once, but dunno if it the real problem.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also try using CLI with &lt;EM&gt;#test&amp;nbsp;nat-policy-match&lt;/EM&gt; and &lt;EM&gt;#test&amp;nbsp;security-policy-match&lt;/EM&gt; to make sure the traffic is hitting it should be hitting. If it is not - check the rules. I think at least&amp;nbsp;RSH should work without decryption in place.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 13:44:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90443#M43574</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2016-06-21T13:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: RSH session issue passing through the Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90464#M43577</link>
      <description>&lt;P&gt;Can you see the sessions are "PREDICT" in that case, you can try app override if ALG is creating issue.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 14:07:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90464#M43577</guid>
      <dc:creator>Roby_Sreejith</dc:creator>
      <dc:date>2016-06-21T14:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: RSH session issue passing through the Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90478#M43578</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;Hi&amp;nbsp;&lt;SPAN class=""&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42773" target="_blank"&gt;Vieplis&lt;/A&gt;,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;l appreciate all your comments.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;So Palo will monitor FTP session/application and should open all agreed ports between&amp;nbsp;client-server.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;But why it doesn't for RSH. Initially, it is allowing, but the session that returns back with different ports traffic hits completely&amp;nbsp;wrong rule.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Cheers&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 14:18:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90478#M43578</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-06-21T14:18:25Z</dc:date>
    </item>
    <item>
      <title>Re: RSH session issue passing through the Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90479#M43579</link>
      <description>&lt;P&gt;Good point Roby. As the system is not alive cannot test it, tomorrow will have more time.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 14:17:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90479#M43579</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-06-21T14:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: RSH session issue passing through the Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90497#M43580</link>
      <description>&lt;P&gt;Yes, for FTP Palo Alto has the knowledge for ALG to work properly and dynamically open data connections based on control traffic.&lt;/P&gt;&lt;P&gt;For RSH it does not have the knowledge of inner workings for&amp;nbsp;RSH, so it does see the first connection and as NAT/Security rulles allows it through - it is allowed further. When RSH creates second session back, Palo Alto has no clue that this second session was derived from the first session - it sees it as a seperate connection and if there are no NAT/Security rules - it is denied. It will not hit the same security rule as first session (it should hit the bidirectional NAT rule though) &amp;nbsp;unless it is configured to do so.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have security rule for two way communication? Or just one rule to initiate first session?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 14:30:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90497#M43580</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2016-06-21T14:30:31Z</dc:date>
    </item>
    <item>
      <title>Re: RSH session issue passing through the Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90525#M43581</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Policy from left&amp;gt;right&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Management_to_Spock_Khan {&lt;BR /&gt;from Management;&lt;BR /&gt;source [ &lt;SPAN&gt;1x2.1x4.1x4.1x5&lt;/SPAN&gt;];&lt;BR /&gt;source-region none;&lt;BR /&gt;to NPS;&lt;BR /&gt;destination [ 1x2.1x4.1x9.2x1 1x2.1x4.1x9.2x2 ];&lt;BR /&gt;destination-region none;&lt;BR /&gt;user any;&lt;BR /&gt;category any;&lt;BR /&gt;application/service [ any/tcp/any/514 any/tcp/any/544 ];&lt;BR /&gt;action allow;&lt;BR /&gt;icmp-unreachable: no&lt;BR /&gt;terminal yes;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Policy from right&amp;gt;left&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASP_to_Management_Unix {&lt;/P&gt;&lt;P&gt;from NPS;&lt;BR /&gt;source [ 192.168.2.161 192.168.2.18 192.168.2.85 192.168.2.80 ];&lt;BR /&gt;source-region none;&lt;BR /&gt;to Management;&lt;BR /&gt;destination 1x2.1x4.1x2.0/21;&lt;BR /&gt;destination-region none;&lt;BR /&gt;user any;&lt;BR /&gt;category any;&lt;BR /&gt;application/service rsh/tcp/any/514;&lt;BR /&gt;action allow;&lt;BR /&gt;icmp-unreachable: no&lt;BR /&gt;terminal yes;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 12:15:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90525#M43581</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-06-22T12:15:10Z</dc:date>
    </item>
    <item>
      <title>Re: RSH session issue passing through the Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90823#M43598</link>
      <description>&lt;P&gt;Can you please post a traffic log example which is denied? So we can probably compare it to the security rules.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 07:53:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90823#M43598</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2016-06-22T07:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: RSH session issue passing through the Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90958#M43617</link>
      <description>&lt;P&gt;Application override resolved the issue. Thank you all for the help&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 12:17:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rsh-session-issue-passing-through-the-palo-alto/m-p/90958#M43617</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-06-22T12:17:15Z</dc:date>
    </item>
  </channel>
</rss>

