<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto - TCP Normalization in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/247790#M70504</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/98460"&gt;@gpsriram&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;From an ASA configuration standpoint I really don't get what you are asking for? Normalization is always enabled on an ASA, so if you have any statements in your current configuration for this there should be more to the configuration than it simply being enabled.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;mentioned, if you describe what you were attempting to do on the ASA we can see what the Palo Alto equivalent would be.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 28 Jan 2019 14:52:54 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2019-01-28T14:52:54Z</dc:date>
    <item>
      <title>Palo Alto - TCP Normalization</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/247308#M70375</link>
      <description>&lt;P&gt;Hi !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are migrating to Palo Alto from ASA Where ASA TCP normalization is enabled for option 28.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How we can achive the same in Palo Alto ?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 09:42:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/247308#M70375</guid>
      <dc:creator>gpsriram</dc:creator>
      <dc:date>2019-01-24T09:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto - TCP Normalization</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/247774#M70498</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/98460"&gt;@gpsriram&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What are you looking to achieve exactly?&lt;/P&gt;
&lt;P&gt;TCP options are generally left alone unless they are malicious, but depending on your needs there may be different approaches&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jan 2019 12:23:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/247774#M70498</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-01-28T12:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto - TCP Normalization</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/247790#M70504</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/98460"&gt;@gpsriram&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;From an ASA configuration standpoint I really don't get what you are asking for? Normalization is always enabled on an ASA, so if you have any statements in your current configuration for this there should be more to the configuration than it simply being enabled.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;mentioned, if you describe what you were attempting to do on the ASA we can see what the Palo Alto equivalent would be.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jan 2019 14:52:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/247790#M70504</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-01-28T14:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto - TCP Normalization</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/247884#M70527</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&amp;amp;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;Thanks for your reply. Below are the ASA configuration.. We are using TCP option 28&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tcp-map TCP28&lt;BR /&gt;tcp-options range 28 28 allow&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;set connection advanced-options TCP28&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jan 2019 00:51:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/247884#M70527</guid>
      <dc:creator>gpsriram</dc:creator>
      <dc:date>2019-01-29T00:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto - TCP Normalization</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/285010#M76377</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/98460"&gt;@gpsriram&lt;/a&gt;&amp;nbsp;Have you found solution for this case yet? because we ran into same kind of problem, if you have solution already please post it here.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 11:29:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/285010#M76377</guid>
      <dc:creator>Pradeepkumar064</dc:creator>
      <dc:date>2019-08-26T11:29:06Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto - TCP Normalization</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/285074#M76380</link>
      <description>&lt;P&gt;So I'm looking into what option 28 is and I don't really see why this is directly needed in the Palo.&amp;nbsp; (If I'm understanding the RFC correctly)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So option 28 is "User Timeout Option"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.iana.org/assignments/tcp-parameters/tcp-parameters.xhtml" target="_blank"&gt;https://www.iana.org/assignments/tcp-parameters/tcp-parameters.xhtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which is specifically referenced here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.ietf.org/html/rfc5482" target="_blank"&gt;https://tools.ietf.org/html/rfc5482&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"This document specifies a new TCP option -- the TCP User Timeout Option (UTO) -- that allows one end of a TCP connection to advertise its current user timeout value. This information provides advice to the other end of the connection to adapt its user timeout&lt;BR /&gt;accordingly. That is, TCP remains free to disregard the advice provided by the UTO option if local policies suggest it to be&lt;BR /&gt;appropriate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Increasing the user timeouts on both ends of a TCP connection allows it to survive extended periods without end-to-end connectivity.&lt;BR /&gt;Decreasing the user timeouts allows busy servers to explicitly notify their clients that they will maintain the connection state only for a&lt;BR /&gt;short time without connectivity."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So is the ultimate intent to just set a VPN/Tunnel timeout value?&amp;nbsp; If so there are already configuration parameters&amp;nbsp;in GP that do this.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 16:14:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/285074#M76380</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-08-26T16:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto - TCP Normalization</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/285095#M76381</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply, today we had received a request from client end asking to block the traffic coming towards Palo alto which is with TCP option 76, because traffic flows in following order,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1, Email Server&lt;/P&gt;&lt;P&gt;2, Palo Alto&lt;/P&gt;&lt;P&gt;3, Riverbed&lt;/P&gt;&lt;P&gt;4, Internet&lt;/P&gt;&lt;P&gt;5, Cisco ASA&amp;nbsp;&lt;/P&gt;&lt;P&gt;6, Email server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Riverbed configuration similar to below details,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;=======================================&lt;/P&gt;&lt;P&gt;Details&lt;/P&gt;&lt;P class="ods_si_para"&gt;Steelhead appliances use following&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;TCP options&lt;/STRONG&gt;:&lt;/P&gt;&lt;DIV class="ods_si_para"&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class="ods_si_para"&gt;&lt;STRONG&gt;Option 76&lt;/STRONG&gt;: Riverbed auto-discovery probe.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="ods_si_para"&gt;&lt;STRONG&gt;Option 77&lt;/STRONG&gt;: OutOfPath NAT.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="ods_si_para"&gt;&lt;STRONG&gt;Option 78&lt;/STRONG&gt;: WAN visibility transparency option.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;=================================================&lt;/P&gt;&lt;P&gt;Cisco ASA:&lt;/P&gt;&lt;P&gt;Here is a configuration example to allow tcp-option 76 through 78.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list riverbed_tcp extended permit tcp any any&lt;/P&gt;&lt;P&gt;class-map tcp-traffic&lt;/P&gt;&lt;P&gt;match access-list riverbed_tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tcp-map allow-probes&lt;/P&gt;&lt;P&gt;tcp-options range 76 78 allow&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class tcp-traffic&lt;/P&gt;&lt;P&gt;set connection advanced-options allow-probes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can we configure the Palo Alto firewall in the same way?&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 26 Aug 2019 16:45:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/285095#M76381</guid>
      <dc:creator>Pradeepkumar064</dc:creator>
      <dc:date>2019-08-26T16:45:36Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto - TCP Normalization</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/285097#M76382</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/73055"&gt;@Pradeepkumar064&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;DIV class="ods_si_para"&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can we configure the Palo Alto firewall in the same way?&lt;/P&gt;&lt;/DIV&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I think you need to change how you're thinking.&amp;nbsp; Just like&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;mentioned to the OP.&amp;nbsp; Don't try to "make Palo be like the ASA," but instead get at what are you trying to accomplish.&amp;nbsp; Then leverage the Palo for that purpose.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on what you described it seems like you're leveraging the ASA "as a poor man's palo" so to speak.&amp;nbsp; Using TCP options as a way to "allow applications."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think ultimately in the Palo world this Riverbed traffic would be an "application" and ultimately, yes you can do what you're doing in Palo like what you're doing in the ASA.&amp;nbsp; You just need to create security policy which leverages the RB apps as identified by Palo.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RIOS.PNG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21119iE5127A4678CDD280/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="RIOS.PNG" alt="RIOS.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 16:53:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/285097#M76382</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-08-26T16:53:27Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto - TCP Normalization</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/294366#M77674</link>
      <description>&lt;P&gt;Sorry I was not checking the forum for long time, Thanks for your suggestion, will share the output once we implement the proposed change.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2019 11:41:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-tcp-normalization/m-p/294366#M77674</guid>
      <dc:creator>Pradeepkumar064</dc:creator>
      <dc:date>2019-10-25T11:41:22Z</dc:date>
    </item>
  </channel>
</rss>

