<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PA firewall can't properly reassemble fragmented packets if the traffic is asymmetric in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-firewall-can-t-properly-reassemble-fragmented-packets-if-the/m-p/197261#M58657</link>
    <description>&lt;P&gt;Hi PA Expert,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a network environment that have an &lt;STRONG&gt;asymmetric routing&lt;/STRONG&gt; and &lt;STRONG&gt;fragmented traffics&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Model: PA5060&lt;/P&gt;&lt;P&gt;PANOS: 8.0.6-h3&lt;/P&gt;&lt;P&gt;Method: vwire mode&lt;/P&gt;&lt;P&gt;No security profiles applied, no zone protection, no QOS, just single security policy that allow all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Already applied this setting to allow asymmetric:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set deviceconfig setting session tcp-reject-non-syn no&lt;/P&gt;&lt;P&gt;set deviceconfig setting tcp asymmetric-path bypass&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All internet traffics are backhauled from this branch to HQ using 2 different ISP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP1: MTU 1500&lt;/P&gt;&lt;P&gt;ISP2: MTU 1380&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;** we can't change (not allowed to change) MTU size on ISP2.&lt;/P&gt;&lt;P&gt;** also, we not allowed to change the network design.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since this is a fully-converged network (ospf) traffic will go to any ISP but the 'return route' from HQ will not follow the same way the traffic is originating.&lt;/P&gt;&lt;P&gt;HQ will load balance the traffic, so means that the traffic will go back to ISP1 or ISP2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the traffic coming from ISP2 (mtu 1380), i know the traffic will be fragmented. But, when the 'fragmented packet' reached to Palo Alto, look like PA firewall can't properly reassemble the fragmented packets.&lt;/P&gt;&lt;P&gt;This will cause all TCP related traffic such as http can't load. The browser will keep loading. User complaining slowness issue.&lt;/P&gt;&lt;P&gt;But, when i bypass PA, all will back to normal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To prove that MTU size is the issue here, We have try to force HQ to set the 'return route' using ISP1 (mtu 1500) only.&lt;/P&gt;&lt;P&gt;The PA is still there (intercepting the traffic) and the results is.....no issue occurred.&amp;nbsp; All webpage load successfully.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, the BIGGEST question is....yes we know the MTU size on ISP2 will cause packet to be fragmented.&lt;/P&gt;&lt;P&gt;There is no issue at all for all traffics.. No slowness issue. All application can load without issue.&lt;/P&gt;&lt;P&gt;But, why after intercepting with 'PALO ALTO FIREWALL'&amp;nbsp; this issue will happen?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this issue caused by this statement: ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="lia-message-body lia-component-body"&gt;&lt;DIV class="lia-message-body-content"&gt;&lt;P&gt;Because H3 added new anti-packet-evasion techniques.&lt;/P&gt;&lt;P&gt;&amp;nbsp;NSS labs discovered they could use certain fragmentation attacks to completely bypass the PAN IPS. So H3 was released which introduces protections against these which require symmetric traffic for the PAN to be able to reassemble the fragments.&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;So, does that mean that there will be issue if trying to assemble packet in "Asymmetric" traffic?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;So, we need your advise how we can solve this issue? Any workaround or settings that must be done on PA to properly reassemble fragmented packets?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Thank You!&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 28 Jan 2018 17:56:31 GMT</pubDate>
    <dc:creator>azman_ansar</dc:creator>
    <dc:date>2018-01-28T17:56:31Z</dc:date>
    <item>
      <title>PA firewall can't properly reassemble fragmented packets if the traffic is asymmetric</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-firewall-can-t-properly-reassemble-fragmented-packets-if-the/m-p/197261#M58657</link>
      <description>&lt;P&gt;Hi PA Expert,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a network environment that have an &lt;STRONG&gt;asymmetric routing&lt;/STRONG&gt; and &lt;STRONG&gt;fragmented traffics&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Model: PA5060&lt;/P&gt;&lt;P&gt;PANOS: 8.0.6-h3&lt;/P&gt;&lt;P&gt;Method: vwire mode&lt;/P&gt;&lt;P&gt;No security profiles applied, no zone protection, no QOS, just single security policy that allow all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Already applied this setting to allow asymmetric:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set deviceconfig setting session tcp-reject-non-syn no&lt;/P&gt;&lt;P&gt;set deviceconfig setting tcp asymmetric-path bypass&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All internet traffics are backhauled from this branch to HQ using 2 different ISP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP1: MTU 1500&lt;/P&gt;&lt;P&gt;ISP2: MTU 1380&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;** we can't change (not allowed to change) MTU size on ISP2.&lt;/P&gt;&lt;P&gt;** also, we not allowed to change the network design.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since this is a fully-converged network (ospf) traffic will go to any ISP but the 'return route' from HQ will not follow the same way the traffic is originating.&lt;/P&gt;&lt;P&gt;HQ will load balance the traffic, so means that the traffic will go back to ISP1 or ISP2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the traffic coming from ISP2 (mtu 1380), i know the traffic will be fragmented. But, when the 'fragmented packet' reached to Palo Alto, look like PA firewall can't properly reassemble the fragmented packets.&lt;/P&gt;&lt;P&gt;This will cause all TCP related traffic such as http can't load. The browser will keep loading. User complaining slowness issue.&lt;/P&gt;&lt;P&gt;But, when i bypass PA, all will back to normal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To prove that MTU size is the issue here, We have try to force HQ to set the 'return route' using ISP1 (mtu 1500) only.&lt;/P&gt;&lt;P&gt;The PA is still there (intercepting the traffic) and the results is.....no issue occurred.&amp;nbsp; All webpage load successfully.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, the BIGGEST question is....yes we know the MTU size on ISP2 will cause packet to be fragmented.&lt;/P&gt;&lt;P&gt;There is no issue at all for all traffics.. No slowness issue. All application can load without issue.&lt;/P&gt;&lt;P&gt;But, why after intercepting with 'PALO ALTO FIREWALL'&amp;nbsp; this issue will happen?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this issue caused by this statement: ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="lia-message-body lia-component-body"&gt;&lt;DIV class="lia-message-body-content"&gt;&lt;P&gt;Because H3 added new anti-packet-evasion techniques.&lt;/P&gt;&lt;P&gt;&amp;nbsp;NSS labs discovered they could use certain fragmentation attacks to completely bypass the PAN IPS. So H3 was released which introduces protections against these which require symmetric traffic for the PAN to be able to reassemble the fragments.&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;So, does that mean that there will be issue if trying to assemble packet in "Asymmetric" traffic?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;So, we need your advise how we can solve this issue? Any workaround or settings that must be done on PA to properly reassemble fragmented packets?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Thank You!&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jan 2018 17:56:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-firewall-can-t-properly-reassemble-fragmented-packets-if-the/m-p/197261#M58657</guid>
      <dc:creator>azman_ansar</dc:creator>
      <dc:date>2018-01-28T17:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: PA firewall can't properly reassemble fragmented packets if the traffic is asymmetric</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-firewall-can-t-properly-reassemble-fragmented-packets-if-the/m-p/197323#M58663</link>
      <description>&lt;P&gt;disabling protections and sanity checks should not be the route to take, as this will render yoiur firewall less effective:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you happen to have a cluster? you could consider HA in Active/Active to tackle assymetry&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you enable layer3 mode, you can also force the MTU to be lower for both links (by adjusting the mss header), this would prevent fragmentation:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Enabling 'Adjust TCP MSS' will inject a new mss header in the tcp packet, reducing MTU on the returning packets" style="width: 721px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13453iFCB47F50220849FF/image-size/large?v=v2&amp;amp;px=999" role="button" title="mss.png" alt="Enabling 'Adjust TCP MSS' will inject a new mss header in the tcp packet, reducing MTU on the returning packets" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Enabling 'Adjust TCP MSS' will inject a new mss header in the tcp packet, reducing MTU on the returning packets&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;also, if you're able to converge both links before they reach the firewall, you wouldn't have an assymetry issue either (you could aggregate both links into a single vwire)&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 09:25:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-firewall-can-t-properly-reassemble-fragmented-packets-if-the/m-p/197323#M58663</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-29T09:25:35Z</dc:date>
    </item>
  </channel>
</rss>

