<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RST First packet isn't a SYN flows (RST Both) + Deny action for NFS (?) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/rst-first-packet-isn-t-a-syn-flows-rst-both-deny-action-for-nfs/m-p/355727#M87575</link>
    <description>&lt;P&gt;the deny action is not configured in the application, but is set in the policy. some applications have a deny action which is the default action the firewall will take if you set the security policy to 'deny' instead of drop&lt;/P&gt;&lt;P&gt;if you want more control over the deny action, you need to set hte security rule to reset client/server/both, and/or enable 'send ICMP unreachable'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;these actions, however, will only apply to 'new' sessions if they get discarded by security policy. any sessions that are interrupted halfway through by an admin clearing the session will see followup packets discarded as 'illegal' packets (non-syn tcp etc) which is part of TCP protection and no longer security policy decissions. these types of packets are discarded (instead of RST) to prevent reconnaissance/DDoS/packet based attacks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 12 Oct 2020 09:07:13 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2020-10-12T09:07:13Z</dc:date>
    <item>
      <title>RST First packet isn't a SYN flows (RST Both) + Deny action for NFS (?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rst-first-packet-isn-t-a-syn-flows-rst-both-deny-action-for-nfs/m-p/355595#M87561</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm right now dealing with a situation where occasionally I need to reset NFS sessions within an HA A/A PA 5220 cluster (see also&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/pan-os-session-table-clearing-gt-no-rst-fin-connection-sent-out/td-p/355556" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/pan-os-session-table-clearing-gt-no-rst-fin-connection-sent-out/td-p/355556&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;More generally, how can I configure the Palo Alto Firewall to RST (instead of dropping, as I figured out based on several packet capture analysis) PSH.ACK TCP segments for TCP sessions for given applications (like NFS - where apparently there's no configured / configurable deny action at application level - see next point) flowing across the firewall and "belonging" to former TCP sessions which are no longer existing within the Firewall Session Table (due to the fact that, for example, and admin manually cleared those sessions) ?&lt;BR /&gt;&lt;BR /&gt;Do I need to perform this at Policy level ? Can this be configured at Platform wide level ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And another question:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recently read this post:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/what-a-difference-a-deny-makes/ba-p/188811" target="_blank"&gt;https://live.paloaltonetworks.com/t5/blogs/what-a-difference-a-deny-makes/ba-p/188811&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;which provided me with useful insights as to how the Palo Alto Firewall resets / drops application traffic - however for the NFS application case that I'm focusing on right now I do not see the possibility to configure any "deny action":&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CarloTaddei_0-1602397214713.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28167i761A87F759461596/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="CarloTaddei_0-1602397214713.png" alt="CarloTaddei_0-1602397214713.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nfs.PNG" style="width: 814px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28168i3DF2FD497AC8BEE6/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="nfs.PNG" alt="nfs.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've also checked the "depends on" and "implicitly uses" applications (portmapper and rpc for the nfs case) - none of them offers the possiblity to configure a "deny action".&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the clarification&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Oct 2020 06:35:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rst-first-packet-isn-t-a-syn-flows-rst-both-deny-action-for-nfs/m-p/355595#M87561</guid>
      <dc:creator>CarloTaddei</dc:creator>
      <dc:date>2020-10-11T06:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: RST First packet isn't a SYN flows (RST Both) + Deny action for NFS (?)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rst-first-packet-isn-t-a-syn-flows-rst-both-deny-action-for-nfs/m-p/355727#M87575</link>
      <description>&lt;P&gt;the deny action is not configured in the application, but is set in the policy. some applications have a deny action which is the default action the firewall will take if you set the security policy to 'deny' instead of drop&lt;/P&gt;&lt;P&gt;if you want more control over the deny action, you need to set hte security rule to reset client/server/both, and/or enable 'send ICMP unreachable'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;these actions, however, will only apply to 'new' sessions if they get discarded by security policy. any sessions that are interrupted halfway through by an admin clearing the session will see followup packets discarded as 'illegal' packets (non-syn tcp etc) which is part of TCP protection and no longer security policy decissions. these types of packets are discarded (instead of RST) to prevent reconnaissance/DDoS/packet based attacks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 09:07:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rst-first-packet-isn-t-a-syn-flows-rst-both-deny-action-for-nfs/m-p/355727#M87575</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-10-12T09:07:13Z</dc:date>
    </item>
  </channel>
</rss>

