<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NMAP Scan, PA show open ports in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nmap-scan-pa-show-open-ports/m-p/389578#M90633</link>
    <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Hello experts!&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;When I scan my firewall from the internet no matter what I try I still get this..&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;PORT STATE SERVICE REASON&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;53/tcp open domain syn-ack ttl 64&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;80/tcp open http syn-ack ttl 64&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;443/tcp open https syn-ack ttl 64&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;8080/tcp open http-proxy syn-ack ttl 64&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;I have setup an untrust-untrust (app) any (application) any and to drop rule at the top of the security. (limited to the nmap scanning ip).&amp;nbsp;&lt;/FONT&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;I have set the ZP to RED but the firewall still says it has ports open.&amp;nbsp;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;I am stuck. Any advice&amp;nbsp;how to stop the PA doing this?&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Darren&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Sun, 07 Mar 2021 13:20:09 GMT</pubDate>
    <dc:creator>BizBo</dc:creator>
    <dc:date>2021-03-07T13:20:09Z</dc:date>
    <item>
      <title>NMAP Scan, PA show open ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nmap-scan-pa-show-open-ports/m-p/389578#M90633</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Hello experts!&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;When I scan my firewall from the internet no matter what I try I still get this..&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;PORT STATE SERVICE REASON&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;53/tcp open domain syn-ack ttl 64&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;80/tcp open http syn-ack ttl 64&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;443/tcp open https syn-ack ttl 64&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;8080/tcp open http-proxy syn-ack ttl 64&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;I have setup an untrust-untrust (app) any (application) any and to drop rule at the top of the security. (limited to the nmap scanning ip).&amp;nbsp;&lt;/FONT&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;I have set the ZP to RED but the firewall still says it has ports open.&amp;nbsp;&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;I am stuck. Any advice&amp;nbsp;how to stop the PA doing this?&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Darren&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Sun, 07 Mar 2021 13:20:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nmap-scan-pa-show-open-ports/m-p/389578#M90633</guid>
      <dc:creator>BizBo</dc:creator>
      <dc:date>2021-03-07T13:20:09Z</dc:date>
    </item>
    <item>
      <title>Re: NMAP Scan, PA show open ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nmap-scan-pa-show-open-ports/m-p/389723#M90646</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11512"&gt;@BizBo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you scanning the dedicated management IP or one of the dataplane interfaces.&lt;/P&gt;&lt;P&gt;Do you have any destination NAT that is refering to the IP address you are scanning?&lt;/P&gt;&lt;P&gt;In the deny rule you have configured, you mentioned you have select any application, but what you have apply for services?&lt;/P&gt;&lt;P&gt;Do you have interface management profile or GlobalProtect applied on this interface?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- If you are scanning the dedicated mgmt inteface not rule will have effect - unless your routing is not forwarding the mgmt traffic over the firewall itself. If you mgmt interface is directly connected to public network, no security rule is applied. You can only use "permit-ip"&lt;/P&gt;&lt;P&gt;- If the IP your are scanning in used in destination NAT rule (or in bi-directional NAT), the actual security rule that will filter traffic to it must have the post-nat destination zone. So your untrust-untrust will not actually match&lt;/P&gt;&lt;P&gt;- If you deny any application, but using default ports&amp;nbsp; you esentially block only "known applications on default ports". Firewall will still allow the initial packets (like tcp-hand-shake), because it needs to detect the application to understand which application it is and if it use its default ports. Proper way to define "deny rule" would be to use "any app" &lt;U&gt;and "&lt;/U&gt;any service"&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Mar 2021 12:29:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nmap-scan-pa-show-open-ports/m-p/389723#M90646</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-03-08T12:29:44Z</dc:date>
    </item>
    <item>
      <title>Re: NMAP Scan, PA show open ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nmap-scan-pa-show-open-ports/m-p/389731#M90649</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;its the untrust on the dataplane,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No the IP is not referenced as this is an Azure VM which I forgot to add.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes the service is set to ANY&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;D.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Mar 2021 13:28:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nmap-scan-pa-show-open-ports/m-p/389731#M90649</guid>
      <dc:creator>BizBo</dc:creator>
      <dc:date>2021-03-08T13:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: NMAP Scan, PA show open ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nmap-scan-pa-show-open-ports/m-p/389757#M90651</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11512"&gt;@BizBo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any interface management profile or GlobalProtect portal/gateway assiged on this interface?&lt;/P&gt;&lt;P&gt;Sorry, but you are loosing me with the Azure... I don't experiance with public clouds so I am little confused why the firewall will even listen on first place.&lt;/P&gt;&lt;P&gt;Anyway if it is dataplane interface traffic should definately pass via the security policy, can share your exact configuration for the deny rule?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Mar 2021 13:57:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nmap-scan-pa-show-open-ports/m-p/389757#M90651</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-03-08T13:57:09Z</dc:date>
    </item>
    <item>
      <title>Re: NMAP Scan, PA show open ports</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nmap-scan-pa-show-open-ports/m-p/389871#M90655</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;When I create a scanning policy on the firewall, I dont assign any security profiles. Then on the scanner I set it to only allow only 1 connection per attempt. What this does is prevent the scan form looking like a major probe to the firewall. You might have to tweak the settings a bit but it'll work out for you. Also please dont make your scans authenticated when scanning external interfaces/etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 08 Mar 2021 22:10:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nmap-scan-pa-show-open-ports/m-p/389871#M90655</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-03-08T22:10:24Z</dc:date>
    </item>
  </channel>
</rss>

