<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: non-syn-tcp global, zone protection profile but still Allow in the traffic logs. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/139154#M48076</link>
    <description>&lt;P&gt;Still a grey area! Logged with TAC&lt;/P&gt;</description>
    <pubDate>Tue, 24 Jan 2017 19:08:41 GMT</pubDate>
    <dc:creator>TranceforLife</dc:creator>
    <dc:date>2017-01-24T19:08:41Z</dc:date>
    <item>
      <title>non-syn-tcp global, zone protection profile but still Allow in the traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138545#M47979</link>
      <description>&lt;P&gt;Hi All Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking for advice here. Want to block&amp;nbsp;non-syn-tcp&amp;nbsp;packets. Global settings are:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt; show session info | match non-SYN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; TCP - reject non-SYN first packet:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; True&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Zone protection profile in place:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="12570_Zone TCP.PNG.png" style="width: 720px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7294i1A096270F81D822C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="12570_Zone TCP.PNG.png" alt="12570_Zone TCP.PNG.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nono-syn-tcp.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7295iB61507C3DAE5F1A4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="nono-syn-tcp.PNG" alt="nono-syn-tcp.PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But still Allow in the traffic logs. Is it normal? If yes, why? One more question. When configuring a zone protection profile reject Non-SYN TCP option is set to global, doest it means that profile&amp;nbsp;will inherit global settings?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;P.S&amp;nbsp;&lt;SPAN&gt;PA-3050 PAN-OS 7.1.7&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thx,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Myky&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 20:40:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138545#M47979</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-01-20T20:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: non-syn-tcp global, zone protection profile but still Allow in he traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138552#M47980</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you need to look at the traffic log as a result of what a security policy decides a session is allowed to do, just like the threat log contains decissions made by a threat prevention/AV profile&lt;/P&gt;
&lt;P&gt;so a session may get allowed in the security policy (by a simple 5-tuple match source zone,source ip, destination zone, destination ip, destination port) but the underlying tcp sanity check may decide that this packet is not 'sane' and drop the packet, but the log has already been created and now there is no further action that could lead to a policy allow or deny, so the log is created as is&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the global setting means that non-syn-tcp is rejected by the system by default, even without a zone protection profile in place&lt;/P&gt;
&lt;P&gt;you can either change the global setting for the whole platform, or you can create a zone protection profile with it's own setting, or which complies to the global setting (global reject, zone protection allow or global allow, zone protection&amp;nbsp; reject or global reject, zone protection global etc. )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this makes sense ?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 12:37:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138552#M47980</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-01-20T12:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: non-syn-tcp global, zone protection profile but still Allow in he traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138554#M47981</link>
      <description>&lt;P&gt;Hi Reaper,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;This stuff is not the best of my side:-) &amp;nbsp;So if policy allows the traffic based on 5 criteria you mentioned earlier why the logs suggest the different (still confused). And is it actually normal to see these logs and is there a way to disable these&amp;nbsp;logs (but leave good logs on)? Doest that mean that the traffic Non-SYN TCP traffic is hitting the destination or not?&amp;nbsp;&lt;/P&gt;&lt;P&gt;On second point l understood&amp;nbsp;if l choice allow Non-SYN TCP, the non-syn-tcp traffic will be allow regardless of the global config, right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the&amp;nbsp;CLI l can see traffic dropped:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="non.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7296i623E2058771B3E33/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="non.PNG" alt="non.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 13:01:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138554#M47981</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-01-20T13:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: non-syn-tcp global, zone protection profile but still Allow in he traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138555#M47982</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;since the log&amp;nbsp;popped up, i'm assuming you may have the non-syn-tcp-drop disabled for a while maybe ? &amp;nbsp;(see now i'm doubting myself &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;normally the packet would get discarded even before a policy check is performed and so no log would appear&lt;/P&gt;
&lt;P&gt;if you do allow non-syn, it will hit security policy and be passed through to the final destination, but be identified as non-syn-tcp because there was no handshake&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you set the zone protection to something else than global, zone protection setting will take precedense over global for that specific zone&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;flow_tc-_non_syn_drop counter will indicate if you re dropping or not, flow_tcp_non_syn will keep incrementing even if you do not drop&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 13:20:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138555#M47982</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-01-20T13:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: non-syn-tcp global, zone protection profile but still Allow in he traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138558#M47985</link>
      <description>&lt;P&gt;Hi Reaper,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is what l want to understand why wold Palo log this non-syn-tcp&amp;nbsp; when globally and even with ZPP its says drop ))&amp;nbsp;&lt;/P&gt;&lt;P&gt;No&amp;nbsp;&lt;SPAN&gt;non-syn-tcp-drop &amp;nbsp;was on all the time but still see new entries. Must be something in the config as l am sure that the firewall is doing what l&amp;nbsp;have asked it to do, this is not always &amp;nbsp;the same as what l want &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Anyway how l can confirm these packets are not actually hitting the destination (PCAP on the box)?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cheers all,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Myky&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 14:00:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138558#M47985</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-01-20T14:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: non-syn-tcp global, zone protection profile but still Allow in he traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138571#M47988</link>
      <description>&lt;P&gt;what version of PAN-OS are you using?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;to my knowledge the non-syn-tcp packets should only show up in traffic log when reject-non-syn-tcp is disabled globally or through zone protection (so we see the packet, but forward it anyway)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;my semi-educated guess is that these packets arrive during &amp;nbsp;specific stage of a session teardown, but you'll want to try to collect a flow basic to see what happens exactly (or at least a packetcapture to try and folow the flow logic)&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 15:35:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138571#M47988</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-01-20T15:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: non-syn-tcp global, zone protection profile but still Allow in he traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138572#M47989</link>
      <description>&lt;P&gt;Hi Reaper,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks as always.&amp;nbsp;&lt;SPAN&gt;PA-3050 PAN-OS 7.1.7.&lt;/SPAN&gt;&amp;nbsp;Will do PCAP (for all stages) and see what l can see.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Myky&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 15:44:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138572#M47989</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-01-20T15:44:15Z</dc:date>
    </item>
    <item>
      <title>Re: non-syn-tcp global, zone protection profile but still Allow in he traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138696#M48008</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp; Can you add something to this please? Cannot figure it out.&lt;/P&gt;</description>
      <pubDate>Sun, 22 Jan 2017 12:05:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138696#M48008</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-01-22T12:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: non-syn-tcp global, zone protection profile but still Allow in the traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138732#M48012</link>
      <description>&lt;P&gt;l think it is normal behaviour as it makes sense&amp;nbsp;now. Reading the KB article&amp;nbsp;&lt;SPAN&gt;Palo Alto Networks firewall will, by default, reject the first packet that does not have the SYN flag turned on as a security measure. Normal TCP connections start with a 3-way handshake, which means if the first packet seen by the firewall is not the SYN packet, it is likely not a valid packet and discards it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So for the new session first packet must be SYN:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SYN.PNG" style="width: 577px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7302i141D3E15E436C93C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="SYN.PNG" alt="SYN.PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If the first packet other than non-SYN flag — such as ACK, URG, RST, FIN:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACK.PNG" style="width: 519px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7303iF7A3159C7306E8C3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ACK.PNG" alt="ACK.PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;and there is no existing session PA will drop the packet. If the session exists it will allow. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="flow.PNG" style="width: 611px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7305i99D68CF9796773F8/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="flow.PNG" alt="flow.PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;A bit strange still that it is appearing &amp;nbsp;in the logs for the already existing session (will confirm on Monday the session details)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Found&amp;nbsp;a bit better explanation on Juniper website:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JUN-OS.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7304iB923402805DF8BEA/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="JUN-OS.PNG" alt="JUN-OS.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.juniper.net/documentation/en_US/junos15.1x49/topics/concept/reconnaissance-deterrence-attack-evasion-tcp-syn-check-understanding.html" target="_blank"&gt;https://www.juniper.net/documentation/en_US/junos15.1x49/topics/concept/reconnaissance-deterrence-attack-evasion-tcp-syn-check-understanding.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Forgive me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Jan 2017 16:24:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/138732#M48012</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-01-22T16:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: non-syn-tcp global, zone protection profile but still Allow in the traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/139154#M48076</link>
      <description>&lt;P&gt;Still a grey area! Logged with TAC&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2017 19:08:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/139154#M48076</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-01-24T19:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: non-syn-tcp global, zone protection profile but still Allow in the traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/154018#M50788</link>
      <description>&lt;P&gt;FYI:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Raising the Activate threshold on the SYN flood protection from 0 to 10,000 has resolved the issue. This is out of my knowledge :0&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2017 11:18:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/154018#M50788</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-04-25T11:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: non-syn-tcp global, zone protection profile but still Allow in the traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/154048#M50796</link>
      <description>&lt;P&gt;i would venture you had random early drop set instead of SYN cookies ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RED should indeed start no earlier than 80% of your limit, preferably even later&lt;/P&gt;
&lt;P&gt;syn cookies should start as soon as possible&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2017 12:56:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/154048#M50796</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-04-25T12:56:00Z</dc:date>
    </item>
    <item>
      <title>Re: non-syn-tcp global, zone protection profile but still Allow in the traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/154050#M50798</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;l think you were cc`d , PA case ref&amp;nbsp;&lt;A href="https://paloaltonetworks.my.salesforce.com/5007000001h6odC" target="_blank"&gt;00608626&lt;/A&gt;&amp;nbsp;for more details &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2017 13:02:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/154050#M50798</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-04-25T13:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: non-syn-tcp global, zone protection profile but still Allow in the traffic logs.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/154059#M50806</link>
      <description>I was indeed shadowing your case &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;</description>
      <pubDate>Tue, 25 Apr 2017 13:39:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/non-syn-tcp-global-zone-protection-profile-but-still-allow-in/m-p/154059#M50806</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-04-25T13:39:11Z</dc:date>
    </item>
  </channel>
</rss>

