<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Session timer getting reset for new syn packet in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416228#M93389</link>
    <description>&lt;P&gt;As the Palo Alto Tac did not help you may need to open a request for enhancement with you local palo alto contact.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still you can on your own check what is the exact error with global counters or flow basic as described in:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-checking-for-drops-rejects-discards/m-p/402102#M91777" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-checking-for-drops-rejects-discards/m-p/402102#M91777&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You then can check if there is option to stop the palo alto protection that drops your tcp sync packets:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/device/device-setup-session/tcp-settings.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/device/device-setup-session/tcp-settings.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/network/network-network-profiles/network-network-profiles-zone-protection/packet-based-attack-protection/tcp-drop.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/network/network-network-profiles/network-network-profiles-zone-protection/packet-based-attack-protection/tcp-drop.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also a small workaround is to set a smaller TCP timeout :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-new-features/app-id-features/service-based-session-timeouts.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-new-features/app-id-features/service-based-session-timeouts.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 30 Jun 2021 10:06:43 GMT</pubDate>
    <dc:creator>NikolayDimitrov</dc:creator>
    <dc:date>2021-06-30T10:06:43Z</dc:date>
    <item>
      <title>Session timer getting reset for new syn packet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416170#M93385</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I got the following scenario.&lt;/P&gt;&lt;P&gt;client -&amp;gt; Paloalto -&amp;gt; Server:1234&lt;/P&gt;&lt;P&gt;The client initiates a tcp session to server always using the same source port and same sequence number (verified in packet capture). The session time out is the default 60 minutes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The client sometimes looses network coverage and initiates a new sync (with same source port and sequence number). But on the firewall the previous session exists and this syn packet is causing the session timer to reset. So the session is never timing out and the capture on firewall is showing that it is dropping all the new syn packets.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We ended up having to clear the sessions manually on firewall for the client to be able to connect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We did open ticket with support and were told that client is not following RFC (they need to stop using same source port and sequence number). But as usual the client is saying that this application is working at other sites and it is firewall issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking for some pointers on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jun 2021 05:25:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416170#M93385</guid>
      <dc:creator>livewire</dc:creator>
      <dc:date>2021-06-30T05:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: Session timer getting reset for new syn packet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416228#M93389</link>
      <description>&lt;P&gt;As the Palo Alto Tac did not help you may need to open a request for enhancement with you local palo alto contact.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still you can on your own check what is the exact error with global counters or flow basic as described in:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-checking-for-drops-rejects-discards/m-p/402102#M91777" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-checking-for-drops-rejects-discards/m-p/402102#M91777&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You then can check if there is option to stop the palo alto protection that drops your tcp sync packets:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/device/device-setup-session/tcp-settings.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/device/device-setup-session/tcp-settings.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/network/network-network-profiles/network-network-profiles-zone-protection/packet-based-attack-protection/tcp-drop.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/network/network-network-profiles/network-network-profiles-zone-protection/packet-based-attack-protection/tcp-drop.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also a small workaround is to set a smaller TCP timeout :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-new-features/app-id-features/service-based-session-timeouts.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-new-features/app-id-features/service-based-session-timeouts.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jun 2021 10:06:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416228#M93389</guid>
      <dc:creator>NikolayDimitrov</dc:creator>
      <dc:date>2021-06-30T10:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: Session timer getting reset for new syn packet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416290#M93405</link>
      <description>&lt;P&gt;Edit:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You may also check if the zone protection porofile is not blocking your second sync packet:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClReCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClReCAK&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jun 2021 13:34:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416290#M93405</guid>
      <dc:creator>NikolayDimitrov</dc:creator>
      <dc:date>2021-06-30T13:34:42Z</dc:date>
    </item>
    <item>
      <title>Re: Session timer getting reset for new syn packet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416454#M93425</link>
      <description>&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;U&gt;To prevent&amp;nbsp;SYN flood&amp;nbsp;attacks, and to preserve&amp;nbsp;&lt;A href="https://www.mygiftcardsite.bid/" target="_self"&gt;&lt;SPAN&gt;mygiftcardsite&lt;/SPAN&gt;&lt;/A&gt; memory, the BIG-IP system can prevent&amp;nbsp;new&amp;nbsp;connections by sending a TCP RST&amp;nbsp;packet&amp;nbsp;to the client with a TCP RST&amp;nbsp;packet&amp;nbsp;when the connection reaches the idle&amp;nbsp;session timeout. The BIG-IP LTM system&amp;nbsp;resets&amp;nbsp;TCP connections after sending eight.&lt;/U&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jul 2021 09:43:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416454#M93425</guid>
      <dc:creator>juan9584</dc:creator>
      <dc:date>2021-07-02T09:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: Session timer getting reset for new syn packet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416463#M93426</link>
      <description>&lt;P&gt;This setting is not enabled&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jul 2021 10:24:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416463#M93426</guid>
      <dc:creator>livewire</dc:creator>
      <dc:date>2021-07-01T10:24:51Z</dc:date>
    </item>
    <item>
      <title>Re: Session timer getting reset for new syn packet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416464#M93427</link>
      <description>&lt;P&gt;See the other things I mentioned.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jul 2021 10:32:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416464#M93427</guid>
      <dc:creator>NikolayDimitrov</dc:creator>
      <dc:date>2021-07-01T10:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: Session timer getting reset for new syn packet</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416466#M93428</link>
      <description>&lt;P&gt;We will try for enchancement request. Also we are testing by lowering time out&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jul 2021 10:42:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/session-timer-getting-reset-for-new-syn-packet/m-p/416466#M93428</guid>
      <dc:creator>livewire</dc:creator>
      <dc:date>2021-07-01T10:42:30Z</dc:date>
    </item>
  </channel>
</rss>

