<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exposing Video conference - &amp;quot;Incomplete&amp;quot; traffic allowed in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158144#M51780</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/38382"&gt;@TheRealDiz&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Can you share more details on how you are actually doing the NAT. H.323 shouldn't be allow every port by any means as H.323. Is this a Polycom unit that you are having troubles with?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 24 May 2017 18:23:50 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2017-05-24T18:23:50Z</dc:date>
    <item>
      <title>Exposing Videoconference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158130#M51777</link>
      <description>Hi all&lt;BR /&gt;&lt;BR /&gt;I have tried to expose Videoconference system behind Palo Alto.&lt;BR /&gt;Unfortunately using App ID in security policy I have seen Palo Alto allows a lot of "incomplete" traffic.&lt;BR /&gt;&lt;BR /&gt;That's really an issue: When enabling h.323 in security Policy App id engine starts to allows every port in order to find something related to this protocol and obviously you will see in the traffic log incomplete as" session end-reason".&lt;BR /&gt;&lt;BR /&gt;Which is the best practice in this kind of situation?&lt;BR /&gt;&lt;BR /&gt;Thanks in ⎌advance&lt;BR /&gt;D!Z</description>
      <pubDate>Wed, 24 May 2017 17:55:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158130#M51777</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2017-05-24T17:55:58Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158138#M51778</link>
      <description>&lt;P&gt;Do you have one public ip or range?&lt;/P&gt;&lt;P&gt;Do you SNAT traffic out from same IP that videoconference system from internet connects to you?&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 17:55:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158138#M51778</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-24T17:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158140#M51779</link>
      <description>I have configured static-ip source mapping with bidirectional option flagged! And I have only one public IP!</description>
      <pubDate>Wed, 24 May 2017 17:58:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158140#M51779</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2017-05-24T17:58:31Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158144#M51780</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/38382"&gt;@TheRealDiz&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Can you share more details on how you are actually doing the NAT. H.323 shouldn't be allow every port by any means as H.323. Is this a Polycom unit that you are having troubles with?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 18:23:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158144#M51780</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-05-24T18:23:50Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158264#M51797</link>
      <description>&lt;P&gt;Nope!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's the issue&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial black,avant garde" color="#FF0000"&gt;H.245&lt;/FONT&gt; is a control channel protocol used with[in] H.323 communication sessions, and involves the line transmission of non-telephone signals.&lt;BR /&gt;Category:&lt;BR /&gt;collaboration&lt;BR /&gt;Subcategory:&lt;BR /&gt;voip-video&lt;BR /&gt;Technology:&lt;BR /&gt;client-server&lt;BR /&gt;Risk:&lt;BR /&gt;3&lt;BR /&gt;&lt;FONT face="arial black,avant garde" color="#FF0000"&gt;Standard Ports:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="arial black,avant garde" color="#FF0000"&gt;tcp/dynamic&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial black,avant garde" color="#FF0000"&gt;How can I proceed with this protocol?! Should I Enable everything?!&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" color="#000000"&gt;Anybody has this issue before?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" color="#000000"&gt;Thx&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" color="#000000"&gt;Luca&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2017 08:26:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158264#M51797</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2017-05-25T08:26:59Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158265#M51798</link>
      <description>&lt;P&gt;I think the only way to proceede is to define a port range with who has configured the Videoconference system and put that range in the NAT bidirectional rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you agree?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;D!ZZZ&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2017 08:40:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158265#M51798</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2017-05-25T08:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158312#M51810</link>
      <description>&lt;P&gt;Well tcp/dynamid does not mean that you permit application traffic on all ports.&lt;/P&gt;&lt;P&gt;You permit TCP 3way handshake on any port but if traffic that follows does not match application that is permitted then session is dropped by Palo.&lt;/P&gt;&lt;P&gt;Bad thing is that if you permit all tcp ports in then attackers can do port scan from outside.&lt;/P&gt;&lt;P&gt;Good example is that you never permit application SMTP and port ANY towards your email server because this will permit anyone outside to scan all ports on your mail server to identify what services are running.&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2017 12:21:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158312#M51810</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-25T12:21:59Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158334#M51819</link>
      <description>&lt;P&gt;Exactly&lt;/P&gt;&lt;P&gt;I'm worried about "port scan" because PA in order to identify an Application, allow the first packets to the server (SYN, SACK).&lt;/P&gt;&lt;P&gt;So I've seen from traffic a lot of attempt from outside to Videoconference server, allowed by Palo Alto:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Incomplete allowed.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9407i42D0BA9C10742BF2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Incomplete allowed.JPG" alt="Incomplete allowed.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NOTE** As you can see the reset is coming from server and packet is allowed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;D!ZZ&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2017 14:17:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158334#M51819</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2017-05-25T14:17:28Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158335#M51820</link>
      <description>&lt;P&gt;Obviously that's a Palo Alto's default behavior .. But when you got an application such as h.245 that has defined as standard port "tcp/dynamic" .. You'll got an issue, because PA's starts to allow first packet (SYN, SACK) in order to identify h.245 application (A LOT OF PACKETS coming in)!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's not great... &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2017 14:23:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158335#M51820</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2017-05-25T14:23:23Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158336#M51821</link>
      <description>&lt;P&gt;Well there is not much that Palo can do - application is designed that way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have video conference only with limited peers you can add their public IP into rule where you permit this traffic in from.&lt;/P&gt;&lt;P&gt;Or create External Dynamic List that pulls Video conference peer IP's from intranet site.&lt;/P&gt;&lt;P&gt;When people in company plan Video conference they just update intranet site and add peer to the list.&lt;/P&gt;&lt;P&gt;No firewall side reconfiguration needed.&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2017 15:03:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158336#M51821</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-25T15:03:00Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158340#M51822</link>
      <description>&lt;P&gt;Also&lt;/P&gt;&lt;P&gt;I'm tryng to configure a strong "Zone protection" profile..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2017 15:16:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158340#M51822</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2017-05-25T15:16:02Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158343#M51825</link>
      <description>&lt;P&gt;Don't jump to strong Zone Protection immidiately.&lt;/P&gt;&lt;P&gt;Go in steps.&lt;/P&gt;&lt;P&gt;From my experience.&lt;/P&gt;&lt;P&gt;Company with 2 sites.&lt;/P&gt;&lt;P&gt;Strict ip and port scan restrictions in Zone protection.&lt;/P&gt;&lt;P&gt;Guy from one site tried to call to guy at other site.&lt;/P&gt;&lt;P&gt;He used Skype that likes to probe what open ports other peer has.&lt;/P&gt;&lt;P&gt;And firewall of site 1 blacklisted site 2. VPN and all intra company traffic were blocked.&lt;/P&gt;&lt;P&gt;Now with newer releases you can exclude some ip's in Zone protection so this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2017 15:54:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158343#M51825</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-25T15:54:09Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158505#M51852</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you think it's possible to apply "zone protection" on DMZ? Or I have to apply this profile on the "OUTSIDE" zone?&lt;/P&gt;&lt;P&gt;I have tried to apply it on DMZ, and test it (configured minimum threshold) with a port scan via NMAP.. No threat logs generated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On which zone "zone protection" has to be applied?&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;D!Z&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2017 14:42:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158505#M51852</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2017-05-26T14:42:24Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158519#M51857</link>
      <description>&lt;P&gt;You can apply zone protection on whatever zone you wish, and really you should have one for your DMZ and your OUTSIDE zones if you have both. Depending on how you have things setup would indicate what zone your traffic shows, but you can verify this in your traffic log by (addr in&amp;nbsp;&lt;EM&gt;publicip)&lt;/EM&gt; and seeing what your destination zone is for traffic going to that address.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2017 16:49:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158519#M51857</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-05-26T16:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: Exposing Video conference - "Incomplete" traffic allowed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158523#M51859</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/38382"&gt;@TheRealDiz&lt;/a&gt;&amp;nbsp;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;mentioned you should enable Zone protection to both zones.&lt;/P&gt;&lt;P&gt;Traffic that is initiated from wan towards DMZ is checked by Zone protection profile on wan (ingress) zone.&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2017 18:11:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/exposing-videoconference-quot-incomplete-quot-traffic-allowed/m-p/158523#M51859</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-26T18:11:35Z</dc:date>
    </item>
  </channel>
</rss>

