<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA Default Behaviour for un-matched UDP traffic? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152631#M50457</link>
    <description>&lt;P&gt;not sure I follow. if we are talking about the unknown-udp app, I don't think it applies here. it has nothing to do with session matching (or lack thereof). it has to do with not being able to associate the traffic with an otherwise known app.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you want more information on that, this article by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt; should help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Pro-Tips-Unknown-Applications/ta-p/77052" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/Pro-Tips-Unknown-Applications/ta-p/77052&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 13 Apr 2017 20:59:34 GMT</pubDate>
    <dc:creator>bradk14</dc:creator>
    <dc:date>2017-04-13T20:59:34Z</dc:date>
    <item>
      <title>PA Default Behaviour for un-matched UDP traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152598#M50446</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am pretty new to PA firewalls, and started looking at the default firewall behaviour for various kinds of traffic.&lt;/P&gt;&lt;P&gt;Hence wanted to know, what happens when PA sees unmatched UDP traffic, say a DNS reply, from outside for which it doesn't have a DNS request recorded from the inside? Does it drops the incoming DNS reply or does it allows it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been searching internet for a while now, but couldn't get the correct answer to this question, any help appreciated&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Fatema.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 16:09:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152598#M50446</guid>
      <dc:creator>Fatema</dc:creator>
      <dc:date>2017-04-13T16:09:32Z</dc:date>
    </item>
    <item>
      <title>Re: PA Default Behaviour for un-matched UDP traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152608#M50447</link>
      <description>&lt;P&gt;If the unknown-udp/tcp&amp;nbsp; applications are added in the security policy then traffic is allowed:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="un.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8798iAF98A379F85D5CFC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="un.PNG" alt="un.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 16:56:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152608#M50447</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-04-13T16:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: PA Default Behaviour for un-matched UDP traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152614#M50451</link>
      <description>&lt;P&gt;Thanks for the answer!&lt;/P&gt;&lt;P&gt;That means the default is PA is going to block it, if we haven't added the unknown-tcp/udp to the security policy?&lt;/P&gt;&lt;P&gt;Also, how to see where it might have been added? I can't find the corresponding tab on the PA-mgmt as shown in your screenshot?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 18:17:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152614#M50451</guid>
      <dc:creator>Fatema</dc:creator>
      <dc:date>2017-04-13T18:17:39Z</dc:date>
    </item>
    <item>
      <title>Re: PA Default Behaviour for un-matched UDP traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152621#M50453</link>
      <description>&lt;P&gt;Okay, I found it. It's under Applications tab (I don't know how I missed it when looking for applications),&lt;/P&gt;&lt;P&gt;so for the security policies having "any"&amp;nbsp;in the "Application" field &amp;nbsp;and "allow" in "Action" field, will be allowing unknown-tcp/udp as well? and all other security policies for which you define corresponding applications (like ssh, web-browsing etc) to allow, will be blocking unknown-tcp/udp?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, had another question: so for all the DNS responses that PA would get for which it doesn't find corresponding DNS requests, won't it be classified under "dns" as application instead of "unknown-udp"?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 19:41:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152621#M50453</guid>
      <dc:creator>Fatema</dc:creator>
      <dc:date>2017-04-13T19:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: PA Default Behaviour for un-matched UDP traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152629#M50455</link>
      <description>&lt;P&gt;don't quote me on this, but it should just be dropped.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if there was no session generated for an outbound DNS request, a stateful firewall would not be able to open the port for the received s2c traffic. it gets even more convoluted when you factor in dynamic ip and port natting, assuming you aren't using public IPs on the inside. most of the time, DNS servers are going to see your public IP, presumably the IP of the untrusted interface, so the best they could do is spoof that as the source IP to generate a response from a DNS server. that would then hit the PA, which would have no session to reference who to forward the response back on to, so it should just drop it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if anything, it should count against a UDP flood attack and be covered under the zone protection file, assuming you have one configured and applied to your untrust interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if that makes any sense.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 20:16:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152629#M50455</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-13T20:16:20Z</dc:date>
    </item>
    <item>
      <title>Re: PA Default Behaviour for un-matched UDP traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152630#M50456</link>
      <description>&lt;P&gt;Thanks Brad for the explanation!&lt;/P&gt;&lt;P&gt;Makes sense. That means PA would automatically going to drop responses if it doesn't find a corresponding session (kinda protection from DNS amplification/reflection attack). For other kind of DOS attacks, &lt;SPAN&gt;zone protection file should take care of them.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Just trying to think, how the above use-case would be different, or same as the "unknown-udp" App.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 20:30:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152630#M50456</guid>
      <dc:creator>Fatema</dc:creator>
      <dc:date>2017-04-13T20:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: PA Default Behaviour for un-matched UDP traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152631#M50457</link>
      <description>&lt;P&gt;not sure I follow. if we are talking about the unknown-udp app, I don't think it applies here. it has nothing to do with session matching (or lack thereof). it has to do with not being able to associate the traffic with an otherwise known app.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you want more information on that, this article by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt; should help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Pro-Tips-Unknown-Applications/ta-p/77052" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/Pro-Tips-Unknown-Applications/ta-p/77052&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 20:59:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152631#M50457</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-13T20:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: PA Default Behaviour for un-matched UDP traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152632#M50458</link>
      <description>&lt;P&gt;Hmm, thanks for the link to the article.&lt;/P&gt;&lt;P&gt;Yeah, I got a little confused between un-matched udp traffic and "unknown-udp", hence wanted to know what happens when PA sees incoming traffic that is not matched with any sessions currently in PA.&lt;/P&gt;&lt;P&gt;So in a nutshell, PA would just drop the traffic silently, as you mentioned earlier.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will look into unknown-udp/tcp App-IDs in more detail to know about them &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 21:10:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152632#M50458</guid>
      <dc:creator>Fatema</dc:creator>
      <dc:date>2017-04-13T21:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: PA Default Behaviour for un-matched UDP traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152667#M50464</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am a little&amp;nbsp;bit late here. I didn't understand your initial question fully and thought&amp;nbsp;you are looking to permit unknown-udp/tcp&amp;nbsp;traffic. As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/58582"&gt;@bradk14&lt;/a&gt;&amp;nbsp;has mentioned&amp;nbsp;already we have stateless (very old firewalls, it is actually ACLs) and stateful firewalls (Palo, SRX ASA etc). So if palo receives the traffic and cannot find any associated session it will try to create one based on the security policies. Bear in mind that your traffic can be classified a "unknown-udp/tcp" and this is based on how the palo&amp;nbsp;app-id engine seeing it. We need to differentiate between&amp;nbsp;&lt;SPAN&gt;unknown-&lt;/SPAN&gt;udp&lt;SPAN&gt;/&lt;/SPAN&gt;tcp&amp;nbsp;as application and the unknown source or destination tcp/udp&amp;nbsp;traffic. Hope this make sense.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;p.s going to get coffee&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2017 08:58:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152667#M50464</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-04-14T08:58:02Z</dc:date>
    </item>
    <item>
      <title>Re: PA Default Behaviour for un-matched UDP traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152672#M50466</link>
      <description>&lt;P&gt;Hmm, now I am confused..&lt;/P&gt;&lt;P&gt;So what should PA do when it sees a DNS reflection attck? i.e thousands of DNS replies to an IP behind PA, for which PA never saw any DNS requests originated from that IP behind PA, will it classify that traffic as unknown-udp and allows it to hit the poor IP behind PA, or will PA drops it thinking "I never saw DNS requests from that IP and hence I am going to drop these bunch of DNS replies to that IP"?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am going to assume, what Brad had mentioned, that PA is going to "silently drop" those DNS replies, as they will not match any current seesions in PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2017 11:42:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152672#M50466</guid>
      <dc:creator>Fatema</dc:creator>
      <dc:date>2017-04-14T11:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: PA Default Behaviour for un-matched UDP traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152690#M50472</link>
      <description>&lt;P&gt;Correct, but PA will classify the traffic not as "&lt;SPAN&gt;unknown-udp" as an application. It will be a simple traffic drop. As traffic trying access from outside to inside without any session match.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2017 14:25:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152690#M50472</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-04-14T14:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: PA Default Behaviour for un-matched UDP traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152697#M50473</link>
      <description>&lt;P&gt;Alrighty, PA should document it somewhere those corner cases, as it becomes difficult for new bees, like me to understand the default PA behavior (or it can be just common sense, that I could be missing &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you TraceforLife and Brad for quick responses and explanations.&lt;/P&gt;&lt;P&gt;Appreciate it!&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2017 17:01:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/152697#M50473</guid>
      <dc:creator>Fatema</dc:creator>
      <dc:date>2017-04-14T17:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: PA Default Behaviour for un-matched UDP traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/153027#M50547</link>
      <description>&lt;P&gt;here's some documentation &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;A title=" Pro-Tips: Unknown Applications" href="https://live.paloaltonetworks.com/t5/Management-Articles/Pro-Tips-Unknown-Applications/ta-p/77052" target="_blank"&gt; Pro-Tips: Unknown Applications&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Apr 2017 14:22:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-default-behaviour-for-un-matched-udp-traffic/m-p/153027#M50547</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-04-18T14:22:52Z</dc:date>
    </item>
  </channel>
</rss>

