Session timer getting reset for new syn packet

cancel
Showing results for 
Search instead for 
Did you mean: 

Session timer getting reset for new syn packet

L1 Bithead

Hi,

I got the following scenario.

client -> Paloalto -> Server:1234

The client initiates a tcp session to server always using the same source port and same sequence number (verified in packet capture). The session time out is the default 60 minutes.

 

The client sometimes looses network coverage and initiates a new sync (with same source port and sequence number). But on the firewall the previous session exists and this syn packet is causing the session timer to reset. So the session is never timing out and the capture on firewall is showing that it is dropping all the new syn packets. 

 

We ended up having to clear the sessions manually on firewall for the client to be able to connect.

 

We did open ticket with support and were told that client is not following RFC (they need to stop using same source port and sequence number). But as usual the client is saying that this application is working at other sites and it is firewall issue.

 

Looking for some pointers on this.

 

6 REPLIES 6

L3 Networker

As the Palo Alto Tac did not help you may need to open a request for enhancement with you local palo alto contact.

 

 

 

Still you can on your own check what is the exact error with global counters or flow basic as described in:

 

https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-checking-for-drops-r...

 

 

 

You then can check if there is option to stop the palo alto protection that drops your tcp sync packets:

 

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/device/device-setup-session/t...

 

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/network/network-network-profi...

 

 

Also a small workaround is to set a smaller TCP timeout :

 

 

https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-new-features/app-id-features/service-based-sessi...

L3 Networker

Edit:

 

 

You may also check if the zone protection porofile is not blocking your second sync packet:

 

 

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClReCAK

L0 Member

To prevent SYN flood attacks, and to preserve mygiftcardsite memory, the BIG-IP system can prevent new connections by sending a TCP RST packet to the client with a TCP RST packet when the connection reaches the idle session timeout. The BIG-IP LTM system resets TCP connections after sending eight.

This setting is not enabled

See the other things I mentioned.

We will try for enchancement request. Also we are testing by lowering time out

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!