<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I apply the anti-POODLE (SSLv3) threat detection to GlobalProtect? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9831#M7218</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Elliot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think firewall is not on latest content, please provide me output for&lt;/P&gt;&lt;P&gt;1. Show system info&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 27 Oct 2014 23:02:37 GMT</pubDate>
    <dc:creator>hshah</dc:creator>
    <dc:date>2014-10-27T23:02:37Z</dc:date>
    <item>
      <title>How do I apply the anti-POODLE (SSLv3) threat detection to GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9828#M7215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wanted to test detection of vulnerability 36815 on inbound traffic to the GlobalProtect portal. I'd received an email from PAN on 10/20 which suggested signature 36815 could be used to block attempted SSL 3.0 sessions including "GlobalProtect SSL VPN". I'll settle for detecting it, which should happen with the default or strict vulnerability protection policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I tried creating a security policy that explicitly allows SSL to the ip address of the GP portal, with a profile that applies strict vulnerability protection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Now if I run the tool at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://www.ssllabs.com/ssltest" rel="nofollow"&gt;https://www.ssllabs.com/ssltest&lt;/A&gt;&lt;SPAN&gt; I can see the traffic in the monitor and I can verify that the rule matches the policy I created. But the test for SSLv3 by Qualys doesn't show up in the threat monitor.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Oct 2014 21:37:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9828#M7215</guid>
      <dc:creator>Elliot_Wilen</dc:creator>
      <dc:date>2014-10-27T21:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: How do I apply the anti-POODLE (SSLv3) threat detection to GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9829#M7216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Elliot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSLv3 vulnerability is covered in latest content. It should detect if rule has anti-vuln profile configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer following thread for more detail.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/message/45826"&gt;Re: Is it possible to Specifically Disable SSL 3.0 on a Palo Alto Interface&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Oct 2014 22:15:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9829#M7216</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-10-27T22:15:53Z</dc:date>
    </item>
    <item>
      <title>Re: How do I apply the anti-POODLE (SSLv3) threat detection to GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9830#M7217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, if I enable, say, the strict vulnerability protection policy on outbound connections, the SSLv3 alert will fire when I access &lt;A href="https://www.poodletest.com/" title="https://www.poodletest.com/"&gt;https://www.poodletest.com/&lt;/A&gt; from my workstation inside the LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I point the tool mentioned above at my GlobalProtect portal, I agree that it &lt;STRONG&gt;should&lt;/STRONG&gt; detect SSLv3. But it doesn't, even though the traffic is logged due to the security policy for ssl traffic to the GlobalProtect portal.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Oct 2014 22:40:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9830#M7217</guid>
      <dc:creator>Elliot_Wilen</dc:creator>
      <dc:date>2014-10-27T22:40:42Z</dc:date>
    </item>
    <item>
      <title>Re: How do I apply the anti-POODLE (SSLv3) threat detection to GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9831#M7218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Elliot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think firewall is not on latest content, please provide me output for&lt;/P&gt;&lt;P&gt;1. Show system info&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Oct 2014 23:02:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9831#M7218</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-10-27T23:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: How do I apply the anti-POODLE (SSLv3) threat detection to GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9832#M7219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt; show system info&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname: PA-5060&lt;/P&gt;&lt;P&gt;ip-address: 10.0.12.1&lt;/P&gt;&lt;P&gt;netmask: 255.255.252.0&lt;/P&gt;&lt;P&gt;default-gateway:&lt;/P&gt;&lt;P&gt;ipv6-address: unknown&lt;/P&gt;&lt;P&gt;ipv6-link-local-address: fe80::290:bff:fe1e:75ae/64&lt;/P&gt;&lt;P&gt;ipv6-default-gateway:&lt;/P&gt;&lt;P&gt;mac-address: 00:90:0b:1e:75:ae&lt;/P&gt;&lt;P&gt;time: Mon Oct 27 16:25:33 2014&lt;/P&gt;&lt;P&gt;uptime: 32 days, 0:14:15&lt;/P&gt;&lt;P&gt;family: 5000&lt;/P&gt;&lt;P&gt;model: PA-5060&lt;/P&gt;&lt;P&gt;serial: 0008C100420&lt;/P&gt;&lt;P&gt;sw-version: 6.0.5&lt;/P&gt;&lt;P&gt;global-protect-client-package-version: 2.0.4&lt;/P&gt;&lt;P&gt;app-version: 465-2419&lt;/P&gt;&lt;P&gt;app-release-date: 2014/10/23&amp;nbsp; 09:15:45&lt;/P&gt;&lt;P&gt;av-version: 1401-1873&lt;/P&gt;&lt;P&gt;av-release-date: 2014/10/24&amp;nbsp; 04:00:01&lt;/P&gt;&lt;P&gt;threat-version: 465-2419&lt;/P&gt;&lt;P&gt;threat-release-date: 2014/10/23&amp;nbsp; 09:15:45&lt;/P&gt;&lt;P&gt;wildfire-version: 43176-49703&lt;/P&gt;&lt;P&gt;wildfire-release-date: 2014/10/26&amp;nbsp; 06:29:02&lt;/P&gt;&lt;P&gt;url-filtering-version: 2014.10.24.806&lt;/P&gt;&lt;P&gt;global-protect-datafile-version: 1414396318&lt;/P&gt;&lt;P&gt;global-protect-datafile-release-date: 2014/10/27 07:51:58&lt;/P&gt;&lt;P&gt;logdb-version: 6.0.6&lt;/P&gt;&lt;P&gt;platform-family: 5000&lt;/P&gt;&lt;P&gt;logger_mode: False&lt;/P&gt;&lt;P&gt;vpn-disable-mode: off&lt;/P&gt;&lt;P&gt;operational-mode: normal&lt;/P&gt;&lt;P&gt;multi-vsys: off&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Oct 2014 23:26:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9832#M7219</guid>
      <dc:creator>Elliot_Wilen</dc:creator>
      <dc:date>2014-10-27T23:26:16Z</dc:date>
    </item>
    <item>
      <title>Re: How do I apply the anti-POODLE (SSLv3) threat detection to GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9833#M7220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Vulnerability signature which is provided will not be applied to traffic destined to&amp;nbsp; firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example: people from DMZ are tried to manage firewall on firewall's DMZ interface, the signature will not be enough to identify ssl3, because content inspection is not applied when traffic is destined to firewall and not passing through the firewall. The same will apply to GP. we would not be able to identify this when SSL connection terminates on untrust interface of firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The work around while we wait for engineering is to host the GP on loopback. Because when the service is hosted on loopback (different zone). This will make packet pass though the CTD engine of firewall to detect vulnerability.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Sai&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Oct 2014 00:02:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9833#M7220</guid>
      <dc:creator>Sai_Tumuluri</dc:creator>
      <dc:date>2014-10-31T00:02:54Z</dc:date>
    </item>
    <item>
      <title>Re: How do I apply the anti-POODLE (SSLv3) threat detection to GlobalProtect?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9834#M7221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have tested this before in the lab that vulnerability profile applied to traffic destined to firewall does work for management but not GP (even if is on a loopback in a different zone).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Oct 2014 02:12:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-apply-the-anti-poodle-sslv3-threat-detection-to/m-p/9834#M7221</guid>
      <dc:creator>shyo</dc:creator>
      <dc:date>2014-10-31T02:12:25Z</dc:date>
    </item>
  </channel>
</rss>

