<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ICMP gets dropped by DEFAULT DENY ANY ANY in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198074#M58829</link>
    <description>&lt;P&gt;Here is our global ICMP rule.&amp;nbsp; We specifically had to add traceroute as well.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="icmp_global.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13583iA05165B224DB53BD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="icmp_global.jpg" alt="icmp_global.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
    <pubDate>Thu, 01 Feb 2018 00:55:54 GMT</pubDate>
    <dc:creator>BrianRa</dc:creator>
    <dc:date>2018-02-01T00:55:54Z</dc:date>
    <item>
      <title>ICMP gets dropped by DEFAULT DENY ANY ANY</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198065#M58828</link>
      <description>&lt;P&gt;Source IP: x.x.172.230&lt;/P&gt;&lt;P&gt;Source Zone: int-fw&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Destination IP: x.x.20.50&lt;/P&gt;&lt;P&gt;Destination Zone: DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Requirements: SRC and DST IPs should be pinged bi-directionally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scenario:&lt;/P&gt;&lt;P&gt;- I've allowed the traffic using ICMP, ICMP-0, ICMP-8, PING bi-directionally but still unsuccessful&lt;/P&gt;&lt;P&gt;- Upon checking the logs, I can see that from SRC ----&amp;gt; DST is allowed using the RULE that I just entered&lt;/P&gt;&lt;P&gt;- Upon seeing the return traffic, it falls to the DENY ANY rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Also in the return traffic, the src zone is int-fw and the dst zone is int-fw also&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;**My rule is above the DENY ANY rule. Please help &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 00:21:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198065#M58828</guid>
      <dc:creator>mcjyrnn</dc:creator>
      <dc:date>2018-02-01T00:21:15Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP gets dropped by DEFAULT DENY ANY ANY</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198074#M58829</link>
      <description>&lt;P&gt;Here is our global ICMP rule.&amp;nbsp; We specifically had to add traceroute as well.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="icmp_global.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13583iA05165B224DB53BD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="icmp_global.jpg" alt="icmp_global.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 00:55:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198074#M58829</guid>
      <dc:creator>BrianRa</dc:creator>
      <dc:date>2018-02-01T00:55:54Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP gets dropped by DEFAULT DENY ANY ANY</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198077#M58830</link>
      <description>&lt;P&gt;Hi Brian, actually I've tried to change the application to ANY. But still no good, it still falls on DENY ANY ANY rule. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 01:20:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198077#M58830</guid>
      <dc:creator>mcjyrnn</dc:creator>
      <dc:date>2018-02-01T01:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP gets dropped by DEFAULT DENY ANY ANY</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198126#M58837</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/82281"&gt;@mcjyrnn&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;could you provide a screenshot of your security policy and logs ?&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 09:23:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198126#M58837</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-02-01T09:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP gets dropped by DEFAULT DENY ANY ANY</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198260#M58865</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/82281"&gt;@mcjyrnn&lt;/a&gt;, we have found that the destination side doesn't really matter (as far as being allowed back,&amp;nbsp;it is a solicited response at that point)&amp;nbsp;as it is all based on the source User, Zone, IP.&amp;nbsp; Something you are filtering on does not match what the rule is configured for.&amp;nbsp; You can pull the rule from the CLI as well (I had to pull from Panorama as I push my rules).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff"&gt;Panorama&amp;gt; set cli config-output-format set&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;Panorama&amp;gt; configure&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;Panorama# show device-group MY_FIREWALL pre-rulebase security rules Global_ICMP&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP profile-setting group MY_Strict_NO_URL&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP target negate no&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP to any&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP from [ MY_ZONES ]&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP source any&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP destination any&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP source-user any&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP category any&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP application [ icmp ipv6-icmp ping traceroute ]&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP service application-default&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP hip-profiles any&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP action allow&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP rule-type universal&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP description "ICMP, Ping, Traceroute"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;set device-group MY_FIREWALL pre-rulebase security rules Global_ICMP log-setting MY_TRAFFIC_LOGS&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A test you could do is set both source and destination Users, Zones, IPs to ANY.&amp;nbsp; Obviously this is not a long term fix but as a test it would let you know if ICMP in general is being caught by your rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Sat, 03 Feb 2018 01:07:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198260#M58865</guid>
      <dc:creator>BrianRa</dc:creator>
      <dc:date>2018-02-03T01:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP gets dropped by DEFAULT DENY ANY ANY</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198426#M58895</link>
      <description>&lt;P&gt;Hi Reaper, those were the logs that I was able get. Attaching the screenshots of my security policies.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rule.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13616i6AECD8A3F97ED8AF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rule.png" alt="rule.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 06:25:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198426#M58895</guid>
      <dc:creator>mcjyrnn</dc:creator>
      <dc:date>2018-02-02T06:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP gets dropped by DEFAULT DENY ANY ANY</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198427#M58896</link>
      <description>&lt;P&gt;Sounds risky as it this is a production firewall. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 06:26:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198427#M58896</guid>
      <dc:creator>mcjyrnn</dc:creator>
      <dc:date>2018-02-02T06:26:59Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP gets dropped by DEFAULT DENY ANY ANY</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198429#M58897</link>
      <description>&lt;P&gt;What confuses me a lot is the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. I believe the first rule should be fine, as Palo Alto is using stateful inspection. However, still I'm getting RTO.&lt;/P&gt;&lt;P&gt;2. Based from the logs that I've gathered.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From src IP to dst IP is being allowed, but still RTO. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I tried to check if I will be able to see the echo reply, then I found these logs which falls to the deny any any &amp;amp; also:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The logs shows that the traffic is interzoning. But it shouldnt be. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 06:31:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198429#M58897</guid>
      <dc:creator>mcjyrnn</dc:creator>
      <dc:date>2018-02-02T06:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP gets dropped by DEFAULT DENY ANY ANY</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198530#M58920</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/82281"&gt;@mcjyrnn&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;It looks like your security policy should be fine but I've ran into this a few times in the past when the following happens.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've ran into a thing in the past where the&amp;nbsp;security rule was working as intended, but the return traffic wasn't registering as returning on the same zone due to some routing funk they had going on at the time. So even though the policy was set to allow the traffic from the 'trust' zone to the 'SfB' zone, the return traffic as the firewall saw it was actually coming back on the 'DZM' zone. Since this wouldn't match the session as return traffic it would fail since we didn't have a rule that allowed traffic in the other position.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm wondering if potentially this isn't your issue; that would explain why it isn't working even with the security policies you've tried.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 14:42:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198530#M58920</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-02-02T14:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP gets dropped by DEFAULT DENY ANY ANY</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198650#M58954</link>
      <description>There are policies that are being allowed going to the samw subnet of the DMZ network but those were servces that were allowed. This one still not working. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;</description>
      <pubDate>Fri, 02 Feb 2018 22:55:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198650#M58954</guid>
      <dc:creator>mcjyrnn</dc:creator>
      <dc:date>2018-02-02T22:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP gets dropped by DEFAULT DENY ANY ANY</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198657#M58956</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/82281"&gt;@mcjyrnn&lt;/a&gt;would you try this rule for me.&amp;nbsp; You should not actually need two rules.&amp;nbsp; By adding both to the source and destination it allows any of the networks to ping eachother.&lt;/P&gt;&lt;P&gt;You can even copy one of the rules and modify it below the two existing.&amp;nbsp; Please also use just the applications I had.&amp;nbsp; RDP is something I would not allow both directions on all IPs.&amp;nbsp; However ICMP, PING, and TraceRoute should not be a problem for testing.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2500.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13650i9074AB5BB347EB43/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2500.png" alt="2500.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;(Yes I did paint hack it ; )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The reasoning for traceroute, like previously mentioned, is to check to make sure the traffic is symetrical and not returning a different route (ping often doesn't mind this) or that it isn't trying to go out a different gateway and getting lost in space.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Sat, 03 Feb 2018 01:42:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198657#M58956</guid>
      <dc:creator>BrianRa</dc:creator>
      <dc:date>2018-02-03T01:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP gets dropped by DEFAULT DENY ANY ANY</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198674#M58961</link>
      <description>&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20690"&gt;@brian&lt;/a&gt;, yes this is what you have mentioned above. Somehow this is a production firewall. Will have to secure approval on this one. But I really am consideting this suggestion. Will let you know oncw I have a feedback</description>
      <pubDate>Sat, 03 Feb 2018 06:56:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/icmp-gets-dropped-by-default-deny-any-any/m-p/198674#M58961</guid>
      <dc:creator>mcjyrnn</dc:creator>
      <dc:date>2018-02-03T06:56:39Z</dc:date>
    </item>
  </channel>
</rss>

