- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
05-27-2017 06:27 PM
Hi
If I have a TCP stream that is initiated and because of routing changes now has to flow through my PA, how to I allow this through.
On my other firewall's I can allow non SYN and SYN/ACK through but block SYN's.. How does one do that on a PA with policies ?
Alex
05-28-2017 06:34 AM
Instructions are here. Be sure to correct to symmetrical routing as soon as possible and remove.
05-28-2017 06:34 AM
Instructions are here. Be sure to correct to symmetrical routing as soon as possible and remove.
05-28-2017 07:57 AM - edited 05-28-2017 08:19 AM
I totally agree sith @pulukas. There is something wrong in the network if you have (new/additional) traffic on the firewall because of a routing change/asymetric routing.
But ... because of this post I had the following idea: Would it be possible to temporary use this "security issue" for pa-200-cluster upgrades without having the sessions interrupted?
05-28-2017 01:28 PM
Hi
Thanks, for the link.
So tell me how would you deal with this scenario. 2 DC at each DC I have a HA Cluster. The HA Clusters are first hops onto the internet say 2 transit providers at each site. You publish your Prefix out.
You have long lived TCP streams to addresses inside so
inside server (with public ip address) -> core network -> PA HA cluster -> ISP -> internet -> Client fw -> client server
just say there is an issue with one of the providers, so the stream that was coming from one internet provider and over the HA pair at DC A is now coming over the internet on HA pair at DC B.
I don't see any reson why the TCP session should be dropped and re created
Alex
05-28-2017 04:23 PM
Hi @Alex_Samad
With this description your situation makes more sense to me and I understand why you want to allow non-syn-tcp traffic. What I did not unterstand: do you want to allow this traffic globally ond both of your clusters or for traffic coming from your internal network?
I evaluate the risk as lower when you only allow this traffic from internal network.
Allowing this traffic from the internet exposes your infrastructure to the following risks:
When you allow this traffic "only" from internal, there are still packets which will be dropped, but at least answers from publicly available servers/requests from internal clients will be processed without the need to establish the session again.
Regards,
Remo
05-28-2017 04:40 PM
Hi
No my hope was to only allow say port 443.
If I have a long lived websocket connection so only 443. I would hope to allow non syn tcp packets only if they are destined for a specific IP and only specific port.
Alex
05-29-2017 01:17 AM
security policy will still be applied, so you can limit the total exposure somewhat, but disabling tcp sanity with non-syn is a system wide setting and can't be limited to a specific port only
-- one gotcha: in zone protection profiles you can also opt to disable non-syn checks, which would allow you to only disable this for one or two specific zones while still enforcing syn on other zones, this could be helpful ? (a little? maybe? 🙂 )
05-29-2017 01:50 AM
Hmmm, okay have to keep that in mind
thanks
05-29-2017 02:48 AM
@reaperwrote:-- one gotcha: in zone protection profiles you can also opt to disable non-syn checks, which would allow you to only disable this for one or two specific zones while still enforcing syn on other zones, this could be helpful ? (a little? maybe? 🙂 )
as I wrote, but as soon as you disable these checks from the internet you have the potential problem of session table flooding ...
05-29-2017 06:32 AM
true true, disabling non-syn protection is never a good idea and should only be enabled to temporarily solve an issue or for troubleshooting
05-29-2017 10:07 AM
Ideally, I would create a connection between the peering routers at the two DC upstream of the PA clusters.
Have the PA cluster at each DC assume primary routing for particular subnets or even specific addresses that are published to the internet. Advertise these specific routes up to the peering routers.
Now both peering routers have specific internal routes for the services published to the internet and that will be the path taken no matter which ISP or DC the traffic arrives on.
Not the assymetry issue will only arise during a failover situation where the prefix or address has to move from DC to DC. And the need to re-establish the session will be far less disruptive and only need to happen at the time of failover.
05-29-2017 03:24 PM
So that seems to be a work around a failing of the PA's
Sorry i think the mantra asym routing is bad is well not the issue. I think I outline a situation where it can happen quite easily.
Happy to accept that the PA don't handle it the best and I will have to take that into account when I build out my network.
But thanks for the input, definitely learning alot
05-30-2017 05:52 PM
Just to clarify, the reason asymmetrical routing is bad is because the PA is doing deep packet inspection for the entire flow. In order to fully protect for threats the PA needs to see all of the packets. When you have asymmetrical routing the each side is only seeing some of the packets and neither has the full picture to evaluate and block the threats.
06-15-2017 11:00 PM
Ok some across an interesting problem around asym routing
again pa1 pa2 ... active active HA config
vlan 13 is my OSPF network
vlan 17 is my client network dgw (10.0.17.1) is a HA arp load sharing ip
loopback.2 is my global protect ip -> this is a /32 and is a HA fail over bound to primary.
I have a pc on vlan 17, it just happens to be hashed to pa2 (backup) dgw.
So packet destined for GP (global protect portal), go pc -> PA2 VLAN17 interface -> vlan 13 (this is the interface is learns about the address via OSPF ) -> PA1 vlan 13 -> loopback.2 from there there return path is loopback.2 -> out vlan 17
And I am having issues with packets not making it to some clients
I can't make global protect portal on a arp load share ... So what to do ...
06-20-2017 03:54 PM
I am having troube picturing the path here.
Is loopback.2 in the same zone as vlan 13?
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!