<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Does  vwire mode still send  TCP reset after drop packet ? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/does-vwire-mode-still-send-tcp-reset-after-drop-packet/m-p/13389#M9815</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Neilwu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct, It should send a TCP RST packet while &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;droping&lt;/SPAN&gt; the connection in V-Wire mode too.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please set below mentioned parameter in that profile and take &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;capture&lt;/SPAN&gt; at both server and client. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DEFAULT ACTION&lt;SPAN class="GINGER_SOFTWARE_mark"&gt; :&lt;/SPAN&gt; Reset-both&lt;/P&gt;&lt;P&gt;DIRECTION- Client-to-Server&lt;/P&gt;&lt;P&gt;AFFECTED SYSTEM: &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Cliend&lt;/SPAN&gt; and server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 21 Apr 2014 15:28:32 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-04-21T15:28:32Z</dc:date>
    <item>
      <title>Does  vwire mode still send  TCP reset after drop packet ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/does-vwire-mode-still-send-tcp-reset-after-drop-packet/m-p/13386#M9812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can see the traffic status show "reset-server" but I can not receive RST packet for this session on the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I have a question, does&amp;nbsp; vwire mode still send&amp;nbsp; TCP reset after drop packet ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Apr 2014 06:13:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/does-vwire-mode-still-send-tcp-reset-after-drop-packet/m-p/13386#M9812</guid>
      <dc:creator>neilwu</dc:creator>
      <dc:date>2014-04-18T06:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: Does  vwire mode still send  TCP reset after drop packet ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/does-vwire-mode-still-send-tcp-reset-after-drop-packet/m-p/13387#M9813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAN firewall will not send a TCP RST packet after dropping a packet&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;,&lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;it will be silently &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;drop&lt;/SPAN&gt;).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently, we can configure our security policy to allow or deny packets only. We do not have a third option called "Reject", when selected can send a TCP Reset, &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ICMP Destination Unreachable&lt;/SPAN&gt; and so on. There is a feature request already submitted for the same, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feature Request: reject &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;action&lt;/SPAN&gt; support in security rule &lt;/P&gt;&lt;P&gt;Request details: "Reject" &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;action&lt;/SPAN&gt; support in security policy rule setting so that PAN device would send TCP-Reset when rejecting session. &lt;/P&gt;&lt;P&gt;FR ID: 408 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Apr 2014 06:42:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/does-vwire-mode-still-send-tcp-reset-after-drop-packet/m-p/13387#M9813</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-04-21T06:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: Does  vwire mode still send  TCP reset after drop packet ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/does-vwire-mode-still-send-tcp-reset-after-drop-packet/m-p/13388#M9814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Hulk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your description.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But In Vulnerability Profile Actions, It's have this option.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="2014-04-21 17 00 53.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/12948_2014-04-21 17 00 53.png" style="width: 620px; height: 83px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so if I use vwire mode and set the Vulnerability Profile Actions to be reset-server, does it can still send RST ?&lt;/P&gt;&lt;P&gt;(In my LAB I don't receive the RST on my server)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Apr 2014 09:03:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/does-vwire-mode-still-send-tcp-reset-after-drop-packet/m-p/13388#M9814</guid>
      <dc:creator>neilwu</dc:creator>
      <dc:date>2014-04-21T09:03:35Z</dc:date>
    </item>
    <item>
      <title>Re: Does  vwire mode still send  TCP reset after drop packet ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/does-vwire-mode-still-send-tcp-reset-after-drop-packet/m-p/13389#M9815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Neilwu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct, It should send a TCP RST packet while &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;droping&lt;/SPAN&gt; the connection in V-Wire mode too.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please set below mentioned parameter in that profile and take &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;capture&lt;/SPAN&gt; at both server and client. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DEFAULT ACTION&lt;SPAN class="GINGER_SOFTWARE_mark"&gt; :&lt;/SPAN&gt; Reset-both&lt;/P&gt;&lt;P&gt;DIRECTION- Client-to-Server&lt;/P&gt;&lt;P&gt;AFFECTED SYSTEM: &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Cliend&lt;/SPAN&gt; and server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Apr 2014 15:28:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/does-vwire-mode-still-send-tcp-reset-after-drop-packet/m-p/13389#M9815</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-04-21T15:28:32Z</dc:date>
    </item>
    <item>
      <title>Re: Does  vwire mode still send  TCP reset after drop packet ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/does-vwire-mode-still-send-tcp-reset-after-drop-packet/m-p/13390#M9816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are blocking an application, about 25% of the applications send a TCP RST. Unfortunately this list is not published.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you suspect the Paloalto is sending the TCP reset, use this command to verify.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin@PA-200&amp;gt;&lt;/P&gt;&lt;P&gt;admin@PA-200&amp;gt; show counter global | match RST&lt;/P&gt;&lt;P&gt;flow_action_close&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7971&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 drop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pktproc&amp;nbsp;&amp;nbsp; TCP sessions closed via injecting RST&lt;/P&gt;&lt;P&gt;flow_action_reset&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 239&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 drop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pktproc&amp;nbsp;&amp;nbsp; TCP clients reset via responding RST&lt;/P&gt;&lt;P&gt;admin@PA-200&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the VWIRE is supposed to be transparent, when the PAN sends the RESET it spoofs the MAC address instead of using a PAN MAC address. The RST will apear to come from one of the next hop gateways. Whatever MAC address is used by the conversation and does not belong to the end point being reset.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Apr 2014 17:56:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/does-vwire-mode-still-send-tcp-reset-after-drop-packet/m-p/13390#M9816</guid>
      <dc:creator>skrall</dc:creator>
      <dc:date>2014-04-22T17:56:59Z</dc:date>
    </item>
  </channel>
</rss>

