<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA-220 Strange IP Spoofing Behaviour in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-strange-ip-spoofing-behaviour/m-p/313891#M81008</link>
    <description>&lt;P&gt;Hi Batd2,&lt;/P&gt;&lt;P&gt;My colleague (who does exist, really) can't now remember exactly how he had configured the box as he was using the web gui.&lt;/P&gt;&lt;P&gt;But, I'd say your suggestion that the firewall sent out ARPs to claim every ip in the subnet sounds like the most likely cause so I'll accept this as the solution. Thanks very much for your help and the speedy response.&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Chris.&lt;/P&gt;</description>
    <pubDate>Mon, 02 Mar 2020 14:42:49 GMT</pubDate>
    <dc:creator>Chris-UNN</dc:creator>
    <dc:date>2020-03-02T14:42:49Z</dc:date>
    <item>
      <title>PA-220 Strange IP Spoofing Behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-strange-ip-spoofing-behaviour/m-p/313500#M80941</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;My colleague and myself are complete Palo newbies so apologies as this is probably covered elsewhere but I don't know what to search for as I've never seen a firewall do this.&amp;nbsp; We bought a PA-220 for evaluation intending to possibly move away from Cisco.&lt;/P&gt;&lt;P&gt;My colleague configured it in a basic way and the box has completely disrupted the test subnet:&lt;/P&gt;&lt;P&gt;The outside interface was configured with an ip address in a subnet, let's call it X, i.e.&lt;/P&gt;&lt;P&gt;firewall ip = 192.168.X.146&lt;/P&gt;&lt;P&gt;subnet mask = 255.255.255.0&lt;/P&gt;&lt;P&gt;static route with next hop = 192.168.X.254&lt;/P&gt;&lt;P&gt;The PA-220 then sent out packets repeatedly spoofing every possible ip in the range, i.e. 192.168.X.1 to 192.168.X.254 so that everything else in that subnet became intermittently unavailable and of course when the PA-220 reached the router IP, .254 everything was affected - so we had an arp table on the router that looked like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Protocol Address Age (min) Hardware Addr Type Interface&lt;BR /&gt;Internet 192.168.X.7 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.6 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.5 45 a08c.fdea.724b ARPA VlanX&lt;BR /&gt;Internet 192.168.X.4 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.3 2 40a8.f05f.a190 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.2 10 f439.090a.9513 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.1 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.15 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.14 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.13 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.12 10 f439.090a.940b ARPA VlanX&lt;BR /&gt;Internet 192.168.X.11 39 8cdc.d43a.7f9e ARPA VlanX&lt;BR /&gt;Internet 192.168.X.10 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.9 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.8 2 40a8.f045.e603 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.23 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.22 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.21 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.20 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.19 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.18 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.17 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.16 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.31 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.30 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.29 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.28 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.27 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.26 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.25 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.24 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.39 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.38 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.37 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.36 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.35 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.34 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.33 81 34e5.ecb5.0b17 ARPA VlanX&lt;BR /&gt;Internet 192.168.X.32 81 34e5.ecb5.0b17 ARPA VlanX&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The mac address of the PA-220 is 34e5.ecb5.0b17.&lt;/P&gt;&lt;P&gt;Just wondering if anyone could point us in the right direction regarding why our box did this.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Chris.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 13:34:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-strange-ip-spoofing-behaviour/m-p/313500#M80941</guid>
      <dc:creator>Chris-UNN</dc:creator>
      <dc:date>2020-02-28T13:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 Strange IP Spoofing Behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-strange-ip-spoofing-behaviour/m-p/313538#M80945</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/134470"&gt;@Chris-UNN&lt;/a&gt;&amp;nbsp;This is can happen when you misconfigure NAT and put a mask to the NAT IP addresses.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 15:06:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-strange-ip-spoofing-behaviour/m-p/313538#M80945</guid>
      <dc:creator>batd2</dc:creator>
      <dc:date>2020-02-28T15:06:51Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 Strange IP Spoofing Behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-strange-ip-spoofing-behaviour/m-p/313545#M80946</link>
      <description>&lt;P&gt;Hi Batd2,&lt;/P&gt;&lt;P&gt;Thanks for the reply. I know my colleague had overload NAT configured,&lt;/P&gt;&lt;P&gt;translation set to dynamic ip and port,&lt;/P&gt;&lt;P&gt;address type set to interface address,&lt;/P&gt;&lt;P&gt;interface set to outside ethernet (1/8)&lt;/P&gt;&lt;P&gt;ip address set to 192.168.X.146/24 --------- looks like this was the culprit...&lt;/P&gt;&lt;P&gt;But there was no PC at that time connected to the inside.&lt;/P&gt;&lt;P&gt;So it seems that the firewall understandably took 192.168.X.146/24 as a pool to use, but I still don't see why it sent out packets using every ip sequentially in that range when there was nothing on the inside trying to connect outwards.&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;Chris.&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 15:43:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-strange-ip-spoofing-behaviour/m-p/313545#M80946</guid>
      <dc:creator>Chris-UNN</dc:creator>
      <dc:date>2020-02-28T15:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 Strange IP Spoofing Behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-strange-ip-spoofing-behaviour/m-p/313571#M80948</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/134470"&gt;@Chris-UNN&lt;/a&gt;&amp;nbsp;Is it possible that your colleague configured it as "bi-directional" or Destination NAT?&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this case, the firewall will use ARP to indicate to its neighbours that it owns the IPs and traffic can be sent to it.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 16:48:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-strange-ip-spoofing-behaviour/m-p/313571#M80948</guid>
      <dc:creator>batd2</dc:creator>
      <dc:date>2020-02-28T16:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 Strange IP Spoofing Behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-strange-ip-spoofing-behaviour/m-p/313891#M81008</link>
      <description>&lt;P&gt;Hi Batd2,&lt;/P&gt;&lt;P&gt;My colleague (who does exist, really) can't now remember exactly how he had configured the box as he was using the web gui.&lt;/P&gt;&lt;P&gt;But, I'd say your suggestion that the firewall sent out ARPs to claim every ip in the subnet sounds like the most likely cause so I'll accept this as the solution. Thanks very much for your help and the speedy response.&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Chris.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 14:42:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-strange-ip-spoofing-behaviour/m-p/313891#M81008</guid>
      <dc:creator>Chris-UNN</dc:creator>
      <dc:date>2020-03-02T14:42:49Z</dc:date>
    </item>
  </channel>
</rss>

