<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall drops  VSS-Management trailer due to Layer 4 checksum enabled in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/373385#M88918</link>
    <description>&lt;P&gt;Thanks Mate, that's really helpful.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We disabled the layer 4 checksum on the network processor and that resolved this issue for us as well.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We made sure that we left the checksum enabled on the dataplane as well.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cracking effort tracking this issue down!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;</description>
    <pubDate>Wed, 09 Dec 2020 22:53:49 GMT</pubDate>
    <dc:creator>Joe_Dun</dc:creator>
    <dc:date>2020-12-09T22:53:49Z</dc:date>
    <item>
      <title>Firewall drops  VSS-Management trailer due to Layer 4 checksum enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/344263#M86136</link>
      <description>&lt;P&gt;This is not an issue, but a general document about an issue that we experience with a customer last weekend. The issue is not well documented by Palo TAC and it took us the help of another customer who experienced the same issue with the same application vendor.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of our Electronic access systems stopped working after changing the perimeter firewalls to PA-5260 over the last weekend. The EAC has controllers (used for building accesses) that need to contact a server in the cloud. Simple configuration on the fw perspective allowing policy, NAT for the internal to external communication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We experienced issue with connecting to server after placing the PA-5260 firewall in the environment and started seeing Server send RST-ACKs in the packet-captures.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the session teardown reason being - &lt;STRONG&gt;tcp-rst-from-server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After taking capture on the server, firewalls and the controllers, we saw a strange behavior on the firewall. Tracing a single TCP stream, we see the controller sends 37 packets to the server, but the firewall ingress interface only receives 36 packets and sends 36 packets to the server. The client keeps send a re transmission packet, since it didn't get any ACK for the PUSH-ACK packet that did not reach the firewall. And after waiting for 14 seconds the server sends a reset.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Deeper investigation into the issue reveals that the packet that does not make it to the firewall is the packet which has a&amp;nbsp; VSS-Management trailer added at the back by the Controllers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VarunRao_0-1597719204504.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27400i532EE29A91217858/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="VarunRao_0-1597719204504.png" alt="VarunRao_0-1597719204504.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The root cause is with newer hardware models that use the FPGA FE100 hardware chip, which causes the firewall drops certain segments containing a VSS-Management trailer. This is due to the firewall performing an FCS on ingress, but the added VSS-Management trailer breaks the checksum and the segment doesn't make it to the destination.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Taking global counters on the firewalls yielded below output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;gt; show counter global filter delta yes | match L4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;[Kflow_fpga_rcv_igr_L4CHKSUMERR 46 5 info flow offload FPGA IGR Exception: L4CHKSUMERR&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;appid_ident_by_dport_first 1386 177 info appid pktproc Application identified by L4 dport first&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;appid_ident_by_dport 38 4 info appid pktproc Application identified by L4 dport&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We see firewall dropping the packets due to checksum failure and hence not making it to the dataplane.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Disable Layer 4 Checksums&lt;/STRONG&gt; &lt;/U&gt;&lt;BR /&gt;Perform the below on both firewalls using HA to minimise any impact. i.e passive first.&lt;BR /&gt;&lt;BR /&gt;1. On the Firewall, disable layer4 checksum using below command:&lt;BR /&gt;&amp;gt; set system setting layer4-checksum disable&lt;BR /&gt;&lt;BR /&gt;2. Reboot the device.&lt;BR /&gt;&lt;BR /&gt;3. After box comes up after reboot, confirm setting in sdb:&lt;BR /&gt;&amp;gt; show system state | match fe100&lt;BR /&gt;&lt;EM&gt;Result: You should be getting l4_chk_sum': 0 as below: &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;cfg.hw.fe100: { 'cfg_mode': 10, 'l4_chk_sum': 0, 'usecase': 1, 'v4_v6_choice': 2,&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;Since L4 checksum will no longer be performed on the firewalls, TCP retransmissions due to invalid checksum would still occur because of the server/client checksum validation.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VarunRao_1-1597720335639.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27401i50CA07AD8D38BBC2/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="VarunRao_1-1597720335639.png" alt="VarunRao_1-1597720335639.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Related documents:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLpICAW" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLpICAW&lt;/A&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-release-notes/pan-os-8-1-addressed-issues/pan-os-8-1-5-addressed-issues" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-release-notes/pan-os-8-1-addressed-issues/pan-os-8-1-5-addressed-issues&lt;/A&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Aug 2020 03:14:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/344263#M86136</guid>
      <dc:creator>VarunRao</dc:creator>
      <dc:date>2020-08-18T03:14:25Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall drops  VSS-Management trailer due to Layer 4 checksum enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/344760#M86232</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/139715"&gt;@VarunRao&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Awsome debugging !&lt;/P&gt;
&lt;P&gt;Thanks for sharing !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 20 Aug 2020 10:20:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/344760#M86232</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2020-08-20T10:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall drops  VSS-Management trailer due to Layer 4 checksum enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/345269#M86312</link>
      <description>&lt;P&gt;Cheers mate!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;VR&lt;/P&gt;</description>
      <pubDate>Tue, 25 Aug 2020 00:49:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/345269#M86312</guid>
      <dc:creator>VarunRao</dc:creator>
      <dc:date>2020-08-25T00:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall drops  VSS-Management trailer due to Layer 4 checksum enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/367218#M88807</link>
      <description>&lt;P&gt;Great find, I believe we are running into exactly the same issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We initially just tried running the below command but that didn't seem to have any real affect by itself.&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;set session strict-checksum no&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;We'll give this a try next week and see how we go.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was keen to understand what the security impact of doing this is though because I don't really understand the risks associated with disabling this checksum. Do you have any insight into this?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 05:33:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/367218#M88807</guid>
      <dc:creator>Joe_Dun</dc:creator>
      <dc:date>2020-12-04T05:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall drops  VSS-Management trailer due to Layer 4 checksum enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/367566#M88846</link>
      <description>&lt;P&gt;Hi Joe,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Palo firewalls normally does a L4 checksum on the dataplane and you ca enable/disable it on the dataplane with the command that you used below, however on the 5200 and 3200 models there is a L4 checksum that it does on the network processor too, if your issue matches the conditions in the above post, you will have to disable it on network processor and keep the L4 checksum on the dataplane, that should not compormise any of your security posture.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is a doc that I could find explaining both dataplane and network processor L4 checksums:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLpICAW" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLpICAW&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;Varun Rao&lt;/P&gt;</description>
      <pubDate>Sun, 06 Dec 2020 23:45:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/367566#M88846</guid>
      <dc:creator>VarunRao</dc:creator>
      <dc:date>2020-12-06T23:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall drops  VSS-Management trailer due to Layer 4 checksum enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/373385#M88918</link>
      <description>&lt;P&gt;Thanks Mate, that's really helpful.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We disabled the layer 4 checksum on the network processor and that resolved this issue for us as well.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We made sure that we left the checksum enabled on the dataplane as well.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cracking effort tracking this issue down!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2020 22:53:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/373385#M88918</guid>
      <dc:creator>Joe_Dun</dc:creator>
      <dc:date>2020-12-09T22:53:49Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall drops  VSS-Management trailer due to Layer 4 checksum enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/373386#M88919</link>
      <description>&lt;P&gt;Glad it is helping people on the forum, sole reason why I had it documented here. There is no Palo alto document on this, since it is not an issue as per PA, but expected behavior of the network processor in 5200/3200's which sometime cause issue with other vendor traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Happy to help!!&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2020 22:57:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/373386#M88919</guid>
      <dc:creator>VarunRao</dc:creator>
      <dc:date>2020-12-09T22:57:34Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall drops  VSS-Management trailer due to Layer 4 checksum enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/452471#M101248</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/139715"&gt;@VarunRao&lt;/a&gt;&amp;nbsp;- Curios to know your&amp;nbsp; perspective of the issue. Would it be safe to assume the access controller vendors are meant to get this fixed from their end? As it is their device that is introducing the VSS-Management trailer which is then breaking the checksum.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Turning off the L4 checksum on the network processor just seems to be a work around but does not fix the root cause? I'm just trying understand the industry perspective of where the fix should lie.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Dec 2021 23:06:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-drops-vss-management-trailer-due-to-layer-4-checksum/m-p/452471#M101248</guid>
      <dc:creator>RobinCP</dc:creator>
      <dc:date>2021-12-09T23:06:25Z</dc:date>
    </item>
  </channel>
</rss>

