<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why is this traffic allowed when the rule should not allow it? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/why-is-this-traffic-allowed-when-the-rule-should-not-allow-it/m-p/220541#M63605</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71756"&gt;@RobinClayton&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You're correct with your comment "Is it just the perculiarity of the firewall knowing "FTP" creates new return sessions and these are allowed logged? I can't see anything in the opposite direction for the other services."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is the way that the firewall is creating "predict" sessions for FTP ALG.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Learning-Articles/Palo-Alto-Networks-Firewall-Session-Overview/ta-p/55633" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Learning-Articles/Palo-Alto-Networks-Firewall-Session-Overview/ta-p/55633&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/app-id/application-level-gateways" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/app-id/application-level-gateways&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a "workaround" to this, you can create an Application-Override policy for the FTP traffic which would in turn disable FTP ALG.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-an-Application-Override-for-FTP/ta-p/58420" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-an-Application-Override-for-FTP/ta-p/58420&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Luke.&lt;/P&gt;</description>
    <pubDate>Wed, 04 Jul 2018 15:12:29 GMT</pubDate>
    <dc:creator>LukeBullimore</dc:creator>
    <dc:date>2018-07-04T15:12:29Z</dc:date>
    <item>
      <title>Why is this traffic allowed when the rule should not allow it?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/why-is-this-traffic-allowed-when-the-rule-should-not-allow-it/m-p/220534#M63604</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am tidying up some rules that were "rush" jobs as part of the initial deployment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;One rule&amp;nbsp;"TEST-VI"&amp;nbsp;was&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;SRC ZONE - TRUST&amp;nbsp;&amp;nbsp;&lt;BR /&gt;DST ZONE - Partners&lt;BR /&gt;DST Addr - I%%%%%A-VIP&lt;/P&gt;&lt;P&gt;Application - Any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was going to get rid of this as there is another rule after it with "Service 20,988,5678" which would be a better match.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But when I looked at the tracffic for the rule &lt;STRONG&gt;"TEST-VI"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;???I see traffic going in both directions "Trust -&amp;gt; Partners" but also "Partners -&amp;gt; Trust"???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The NAT rule matches the sources and destinations.&lt;/P&gt;&lt;P&gt;Source (Trust) = 128.%.%.22&lt;BR /&gt;Dest (Trust) = 128.%.%.244&lt;BR /&gt;Source Translated = 192.%.%.111&lt;BR /&gt;Dest Translated = 192.%.%.254&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why is the security rule allowing the traffic Partner to Trust??&lt;BR /&gt;&lt;BR /&gt;Is it just the perculiarity of the firewall knowing "FTP" creates new return sessions and these are allowed logged? I can't see anything in the opposite direction for the other services.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="palo.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/15772iD4F3B3D960B1D49C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="palo.jpg" alt="palo.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jul 2018 14:53:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/why-is-this-traffic-allowed-when-the-rule-should-not-allow-it/m-p/220534#M63604</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2018-07-04T14:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: Why is this traffic allowed when the rule should not allow it?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/why-is-this-traffic-allowed-when-the-rule-should-not-allow-it/m-p/220541#M63605</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71756"&gt;@RobinClayton&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You're correct with your comment "Is it just the perculiarity of the firewall knowing "FTP" creates new return sessions and these are allowed logged? I can't see anything in the opposite direction for the other services."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is the way that the firewall is creating "predict" sessions for FTP ALG.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Learning-Articles/Palo-Alto-Networks-Firewall-Session-Overview/ta-p/55633" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Learning-Articles/Palo-Alto-Networks-Firewall-Session-Overview/ta-p/55633&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/app-id/application-level-gateways" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/app-id/application-level-gateways&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a "workaround" to this, you can create an Application-Override policy for the FTP traffic which would in turn disable FTP ALG.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-an-Application-Override-for-FTP/ta-p/58420" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-an-Application-Override-for-FTP/ta-p/58420&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Luke.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jul 2018 15:12:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/why-is-this-traffic-allowed-when-the-rule-should-not-allow-it/m-p/220541#M63605</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2018-07-04T15:12:29Z</dc:date>
    </item>
    <item>
      <title>Re: Why is this traffic allowed when the rule should not allow it?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/why-is-this-traffic-allowed-when-the-rule-should-not-allow-it/m-p/220543#M63607</link>
      <description>&lt;P&gt;Ahh good, that means I should be good to disable the bad rule and leave the correct rule and ALG to do the job.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jul 2018 15:35:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/why-is-this-traffic-allowed-when-the-rule-should-not-allow-it/m-p/220543#M63607</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2018-07-04T15:35:40Z</dc:date>
    </item>
  </channel>
</rss>

