<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Safe Port Scanning in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/safe-port-scanning/m-p/419036#M93743</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;You can add the source IP of the scanner as an Address Exclusion in the zone protection profile. The other thing I have done in the past is slow the scanner down, i.e. only uses 1 check at a time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Tue, 13 Jul 2021 17:27:10 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2021-07-13T17:27:10Z</dc:date>
    <item>
      <title>Safe Port Scanning</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/safe-port-scanning/m-p/418832#M93726</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I perform a nmap port scan on my IP range protected by Palo Alto Firewall, almost every port responded to SYN scan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is a known issue, as I found:&lt;/P&gt;&lt;P&gt;Port scan report shows all TCP ports are open&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClgRCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClgRCAS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I want to successfully perform a port scan, the only solution seems to be to disable SYN flood protection.&lt;/P&gt;&lt;P&gt;Do anyone know if there is anyway to "whitelist" a source IP, so a particular IP can perform port scan without interference from the flood protection component, but still enable flood protection to the general public?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been told that Palo Alto tech support informed us that there is no way to "whitelist" a source IP for port scan, and the only resolutions are:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Disable SYN flood protection.&lt;/LI&gt;&lt;LI&gt;Change the Action from SYN Cookie to Random Early Drop.&lt;/LI&gt;&lt;LI&gt;Increase the threshold for activation.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;I just wanted to pick the brains of the community to see if there is any other way to perform port scan on the firewall without disabling flood protection completely.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jul 2021 10:31:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/safe-port-scanning/m-p/418832#M93726</guid>
      <dc:creator>tingmy</dc:creator>
      <dc:date>2021-07-13T10:31:12Z</dc:date>
    </item>
    <item>
      <title>Re: Safe Port Scanning</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/safe-port-scanning/m-p/419036#M93743</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;You can add the source IP of the scanner as an Address Exclusion in the zone protection profile. The other thing I have done in the past is slow the scanner down, i.e. only uses 1 check at a time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jul 2021 17:27:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/safe-port-scanning/m-p/419036#M93743</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-07-13T17:27:10Z</dc:date>
    </item>
    <item>
      <title>Re: Safe Port Scanning</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/safe-port-scanning/m-p/419682#M93811</link>
      <description>&lt;P&gt;There are only 3 places in the firewall GUI for my PA-220 that I can reasonable add in the exclusion for my scanner's IP as shown below:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;NETWORK -&amp;gt; Network Profiles -&amp;gt; Zone Protection -&amp;gt; (My Profile Name) -&amp;gt; Zone Protection Profile (Reconnaissance Protection) -&amp;gt;&lt;BR /&gt;SOURCE ADDRESS EXCLUSION&lt;/LI&gt;&lt;LI&gt;NETWORK -&amp;gt; Zones -&amp;gt; (My Zone Name that use ZONE PROTECTION PROFILE) -&amp;gt; User Identification ACL -&amp;gt; EXCLUDE LIST&lt;/LI&gt;&lt;LI&gt;NETWORK -&amp;gt; Zones -&amp;gt; (My Zone Name that use ZONE PROTECTION PROFILE) -&amp;gt; Device-ID ACL -&amp;gt; EXCLUDE LIST&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Unfortunately, adding my scanner's IP to these 3 places did not resolve the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fortunately, I noticed the following setting:&lt;/P&gt;&lt;P&gt;NETWORK -&amp;gt; Network Profiles -&amp;gt; Zone Protection -&amp;gt; (My Profile Name) -&amp;gt; Zone Protection Profile (Flood Protection) -&amp;gt; SYN&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Action: SYN Cookies&lt;/LI&gt;&lt;LI&gt;Activate: 0&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Someone had set "Activate" to 0, which is too low. After I changed it to 25,000 as per the PA recommendation, I no longer encounter the problem of every port responding to SYN or CONNECT scan as open.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jul 2021 15:26:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/safe-port-scanning/m-p/419682#M93811</guid>
      <dc:creator>tingmy</dc:creator>
      <dc:date>2021-07-15T15:26:00Z</dc:date>
    </item>
  </channel>
</rss>

