02-09-2021 10:37 PM
In my case, the team is performing a vulnerability assessment on PA820
Vulnerability Title: TCP timestamp response.
Description: The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their TCP timestamps.
The scanning was running to the MGMT IP,
How to disable the timestamp response.