<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DSRI on IPSec/VPN traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dsri-on-ipsec-vpn-traffic/m-p/169362#M53818</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&lt;/P&gt;&lt;P&gt;You're absolutely right. When the tunnel is already established, palo only sees jibberish where it is not able to check anything.&lt;/P&gt;&lt;P&gt;But there could be rare edge cases, while establishing a tunnel, a malformed response could be very dangerous, if there is a vulnerability in the vpn client software (not the first time something like that happens). A vulnerability like that could be detected by palo.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very theoretical, but ... &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 01 Aug 2017 17:15:06 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2017-08-01T17:15:06Z</dc:date>
    <item>
      <title>DSRI on IPSec/VPN traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dsri-on-ipsec-vpn-traffic/m-p/169309#M53811</link>
      <description>&lt;P&gt;We have a rule allowing VPN traffic (IPSec) from our Guest environment. This traffic is non-decryptable. We would like to reduce CPU by disabling Server Response Inspection for this traffic? Do we lose anything from a security perspective if we do so? If there is a change in the application, will app-id still detect it?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 15:37:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dsri-on-ipsec-vpn-traffic/m-p/169309#M53811</guid>
      <dc:creator>LCMember1643</dc:creator>
      <dc:date>2017-08-01T15:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: DSRI on IPSec/VPN traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dsri-on-ipsec-vpn-traffic/m-p/169351#M53815</link>
      <description>&lt;P&gt;As you already wrote this traffic cannot be decrypted. So the only (very) little thing you or better say your guests loose from a security perspective is that your paloalto cannot protect your guests from vulnerabilities that can be exploited from vpn gateways to their clients. --&amp;gt; as it is your guestnetwork, i don't see a reason that you need to protect them from malicious vpn gateways.&lt;/P&gt;&lt;P&gt;The firewall is still able to detect app changes, but only in the client2server traffic and no longer in server2client traffic.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 16:38:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dsri-on-ipsec-vpn-traffic/m-p/169351#M53815</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-01T16:38:49Z</dc:date>
    </item>
    <item>
      <title>Re: DSRI on IPSec/VPN traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dsri-on-ipsec-vpn-traffic/m-p/169353#M53817</link>
      <description>&lt;P&gt;I don't think you get any benefit as if Palo identifies application that is encrypted (like SSL) and you don't apply decyption policy it will let it through the firewall without trying to apply deep packet inspection.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 16:49:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dsri-on-ipsec-vpn-traffic/m-p/169353#M53817</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-08-01T16:49:13Z</dc:date>
    </item>
    <item>
      <title>Re: DSRI on IPSec/VPN traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dsri-on-ipsec-vpn-traffic/m-p/169362#M53818</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&lt;/P&gt;&lt;P&gt;You're absolutely right. When the tunnel is already established, palo only sees jibberish where it is not able to check anything.&lt;/P&gt;&lt;P&gt;But there could be rare edge cases, while establishing a tunnel, a malformed response could be very dangerous, if there is a vulnerability in the vpn client software (not the first time something like that happens). A vulnerability like that could be detected by palo.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very theoretical, but ... &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 17:15:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dsri-on-ipsec-vpn-traffic/m-p/169362#M53818</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-01T17:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: DSRI on IPSec/VPN traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dsri-on-ipsec-vpn-traffic/m-p/169363#M53819</link>
      <description>&lt;P&gt;Agree.&lt;/P&gt;&lt;P&gt;I should be really desperate to turn DSRI on (read: firewall really overloaded and no way to get it upgraded).&lt;/P&gt;&lt;P&gt;Even if you host servers they might get compromised and with DSRI you don't identify if they start attacking others or website starts spreading viruses around.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 17:24:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dsri-on-ipsec-vpn-traffic/m-p/169363#M53819</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-08-01T17:24:45Z</dc:date>
    </item>
  </channel>
</rss>

