<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Forward segments exceeding TCP content inspection queue in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158052#M51759</link>
    <description>&lt;P&gt;yes, each session has an individual queue; so one application may be impacted while another is not, depending on the circumstances&lt;/P&gt;</description>
    <pubDate>Wed, 24 May 2017 12:42:27 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2017-05-24T12:42:27Z</dc:date>
    <item>
      <title>Forward segments exceeding TCP content inspection queue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/157950#M51727</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On a new PA-3020 Firewallcluster I decided to disable the default setting "Forward segments exceeding TCP content inspection queue". Practically everything was working as it should. But onfortunately the devil is in the details. I had very few connections, specially http downloads, which where causing problems. Sometimes the same download was working, sometimes it was just somewhere between slow and really slow and sometimes the download was stopping completely.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The following is written in PaloAlto Best Practices for securing your network from layer 4 and layer 7 evasions:&lt;/P&gt;&lt;DIV class="xml_bullet-Indent_33 xml parbase"&gt;&lt;DIV class="bullet-Indent"&gt;"By default, when the TCP or UDP content inspection queue is full, the firewall skips Content-ID inspection for TCP segments or UDP datagrams that exceed the queue limit of 64. By disabling these options, the firewall instead drops TCP segments and UDP datagrams when the corresponding TCP or UDP content inspection queue is full.&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="xml_bullet-Indent_34 xml parbase"&gt;&lt;DIV class="bullet-Indent"&gt;Disabling these options can result in performance degradation and some applications may incur loss of functionality, particularly in high-volume traffic situations."&lt;/DIV&gt;&lt;DIV class="bullet-Indent"&gt;( &lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/threat-prevention/best-practices-for-securing-your-network-from-layer-4-and-layer-7-evasions" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/threat-prevention/best-practices-for-securing-your-network-from-layer-4-and-layer-7-evasions&lt;/A&gt; )&lt;/DIV&gt;&lt;DIV class="bullet-Indent"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="bullet-Indent"&gt;So because of these Problems I was forced to turn on this setting again. But now I am not really sure what exact risk does this mean or in which cases is enabling this setting effectively going to be a security issue?&lt;/DIV&gt;&lt;DIV class="bullet-Indent"&gt;And there is also this question: Shouldn't a PA-3020 be able to process an 100 Mbit/s download with this setting turned off? (at the time when a download failed the active sessions were at about 5000 while 3500 of them were decrypted)&lt;/DIV&gt;&lt;DIV class="bullet-Indent"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="bullet-Indent"&gt;I would appreciate your opinions and inputs to this.&lt;/DIV&gt;&lt;DIV class="bullet-Indent"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="bullet-Indent"&gt;Regards,&lt;/DIV&gt;&lt;DIV class="bullet-Indent"&gt;Remo&lt;/DIV&gt;&lt;DIV class="bullet-Indent"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="bullet-Indent"&gt;PS: The same questions also apply to the setting for UDP&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 24 May 2017 08:57:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/157950#M51727</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-24T08:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: Forward segments exceeding TCP content inspection queue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158043#M51755</link>
      <description>&lt;P&gt;The queue is used to enable ctd to scan across fragmentation, missing or out of order segments. If there are high amounts of these in a session, the queue for that session might get exceeded and the configured action will be taken to clear the queue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if this happens a lot on valid sessions, it might be good to investigate the cause and try to fix that (by for example enabling TCP MSS and lowering the MTU)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 10:00:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158043#M51755</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-05-24T10:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: Forward segments exceeding TCP content inspection queue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158051#M51758</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;is this max queue of 64 per session?&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 12:34:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158051#M51758</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-24T12:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: Forward segments exceeding TCP content inspection queue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158052#M51759</link>
      <description>&lt;P&gt;yes, each session has an individual queue; so one application may be impacted while another is not, depending on the circumstances&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 12:42:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158052#M51759</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-05-24T12:42:27Z</dc:date>
    </item>
    <item>
      <title>Re: Forward segments exceeding TCP content inspection queue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158067#M51765</link>
      <description>&lt;P&gt;Is there cli command to get current queue length for different sessions.&lt;/P&gt;&lt;P&gt;Let's say top 10 sessions with biggest queue?&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 14:15:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158067#M51765</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-24T14:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: Forward segments exceeding TCP content inspection queue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158068#M51766</link>
      <description>&lt;P&gt;you can check the overall state of CTD&lt;/P&gt;
&lt;PRE&gt;&amp;gt; debug dataplane show ctd memory-state &lt;/PRE&gt;
&lt;P&gt;not sure if you can go as far as to check per session as that's gonna put you in a highly volatile environment&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 14:21:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158068#M51766</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-05-24T14:21:23Z</dc:date>
    </item>
    <item>
      <title>Re: Forward segments exceeding TCP content inspection queue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158109#M51772</link>
      <description>&lt;P&gt;All right so I will now do a deep dive into MTU/MSS troubleshooting. It remains a little strange to me (probably because of not enough knowledge about MTU/MSS), but for 1.5 month there where absolutely no complaints from the customer about connection problems. This one download, actually one website where different downloads where provided, was the only problem.&lt;BR /&gt;Even this troubleshooting took a while because I wasn't thinking at all that it could be related to this (also because everything else was working).&lt;BR /&gt;Because of no threat logs and no other blocked connections, I did the next test with disabling various settings in the zone protection profile up to disable the zone protection completely. Without success. So the next step was a "flow basic" debugging where I have seen in the counters that there where ctd_exceed_quque drops. Then the situation was pretty clear why the download was failing.&lt;BR /&gt;&lt;BR /&gt;So thanks &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt; for pointing me to the right direction for the next steps in the troubleshooting process&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 18:46:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158109#M51772</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-24T18:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: Forward segments exceeding TCP content inspection queue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158148#M51782</link>
      <description>Global counters were actually my bread and butter during most troubleshooting sessions&lt;BR /&gt;They're easy to obtain (set filters, run global counters with delta) and give you immediate feedback on what's happening with your session&lt;BR /&gt;&lt;BR /&gt;I'd recommend using them more often &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
      <pubDate>Wed, 24 May 2017 18:46:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/forward-segments-exceeding-tcp-content-inspection-queue/m-p/158148#M51782</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-05-24T18:46:13Z</dc:date>
    </item>
  </channel>
</rss>

