<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow remote host to port scan in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/allow-remote-host-to-port-scan/m-p/666#M517</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the explanation of TCP Scan settings in Zone Protection profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interval (sec) - Enter the time interval for port scans and host sweep detection (seconds).&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Threshold (events) - &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Enter the number of scanned ports within the specified time interval that will trigger this protection type (events).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keep the scanning rate below values configured for above two parameters..&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Try this -&amp;gt; &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;nmap -sS hostname --max-rate 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or a very slow scanning which will never trigger the alarm TCP Scan 8001.&lt;BR /&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;&lt;BR /&gt;nmap -sS hostname --max-rate 0.1 &lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;For more details check nmap's guide -&amp;gt; &lt;A href="https://nmap.org/book/man-performance.html" title="https://nmap.org/book/man-performance.html"&gt;Timing and Performance&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 28 Feb 2015 03:01:39 GMT</pubDate>
    <dc:creator>jthakur</dc:creator>
    <dc:date>2015-02-28T03:01:39Z</dc:date>
    <item>
      <title>Allow remote host to port scan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-remote-host-to-port-scan/m-p/663#M514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am looking to allow a single host on the outside to run an NMAP port scan. What can I do to allow this host to get an accurate picture from the outside without giving additional access that may skew the results? In addition I would need it to bypass vulnerability protection (TCP Scan 8001). Looking at my scan attempts I see the application type come back as Traceroute, non-applicable, lpd, dns, icmp and ssh. I am open to ideas, thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Feb 2015 19:37:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-remote-host-to-port-scan/m-p/663#M514</guid>
      <dc:creator>mcocat</dc:creator>
      <dc:date>2015-02-27T19:37:10Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote host to port scan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-remote-host-to-port-scan/m-p/664#M515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mcocat,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say user X is on outside network. And It wants to do scanning for user Y and Z. Than allow "any" "any" access to user X to user Y&amp;amp;Z. Make sure you dont apply and profile to rule, This will by pass all type of scanning on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now create another rule for port 8001. Configure appropriate source and destination. In the rule do not specify vulnerability profile. Let me know if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Feb 2015 20:24:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-remote-host-to-port-scan/m-p/664#M515</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2015-02-27T20:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote host to port scan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-remote-host-to-port-scan/m-p/665#M516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't want to grant more access than is currently available though. I want to see the true picture of what is open from the outside. I just want to bypass the scan threat that is being blocked. the threat id is 8001, not the port I am trying to access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Feb 2015 21:34:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-remote-host-to-port-scan/m-p/665#M516</guid>
      <dc:creator>mcocat</dc:creator>
      <dc:date>2015-02-27T21:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote host to port scan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-remote-host-to-port-scan/m-p/666#M517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the explanation of TCP Scan settings in Zone Protection profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interval (sec) - Enter the time interval for port scans and host sweep detection (seconds).&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Threshold (events) - &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Enter the number of scanned ports within the specified time interval that will trigger this protection type (events).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keep the scanning rate below values configured for above two parameters..&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Try this -&amp;gt; &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;nmap -sS hostname --max-rate 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or a very slow scanning which will never trigger the alarm TCP Scan 8001.&lt;BR /&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;&lt;BR /&gt;nmap -sS hostname --max-rate 0.1 &lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;For more details check nmap's guide -&amp;gt; &lt;A href="https://nmap.org/book/man-performance.html" title="https://nmap.org/book/man-performance.html"&gt;Timing and Performance&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Feb 2015 03:01:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-remote-host-to-port-scan/m-p/666#M517</guid>
      <dc:creator>jthakur</dc:creator>
      <dc:date>2015-02-28T03:01:39Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote host to port scan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-remote-host-to-port-scan/m-p/667#M518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mcoat,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In that case create a policy which allows port 8001 traffic between specific source and destination. Do not apply any profiles to it. And Firewall will not check threat for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to configure profile due to security reasons than create an exception for 8001. Please refer bellow document for the same.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-7907"&gt;Add a Vulnerability Exception Specifically Based Upon Source and Destination IP Address&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Feb 2015 14:53:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-remote-host-to-port-scan/m-p/667#M518</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2015-02-28T14:53:54Z</dc:date>
    </item>
    <item>
      <title>Re: Allow remote host to port scan</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-remote-host-to-port-scan/m-p/668#M519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately, you can't white list an ip address for these scans.&amp;nbsp; The TCP Scan 8001 is generated by your Zone Protection profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;network--Network Profiles--Zone Protection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ZoneProtectionProfile.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/18508_ZoneProtectionProfile.png" style="height: 292px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These only have actions for alert or block variations globally for the entire zone to which the policy is applied.&amp;nbsp; you cannot override this by a specific security policy or other means.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think your best bet is to turn the action to alert, as show above, during your test and restore the original setting afterwards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Mar 2015 01:33:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-remote-host-to-port-scan/m-p/668#M519</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-03-02T01:33:56Z</dc:date>
    </item>
  </channel>
</rss>

