01-26-2021 04:37 PM
Just curious if there is a definition for the new variant referenced here: https://www.armis.com/resources/iot-security-blog/nat-slipstreaming-v2-0-new-attack-variant-can-expo...
01-27-2021 08:28 AM
I could find anything from PAN with searching. I opened a case and will let you know what they tell me.
01-28-2021 07:44 AM
Here is the reply from TAC:
We released 5 different signatures with Content: 8341 (2020-11-09 UTC).
01-28-2021 07:53 AM
Do those cover the v2 variant?
01-28-2021 07:54 AM
Thanks for looking into that, but 2020-11-09 was before Nat Slipstreaming V2 was disclosed (on Jan 26th 2021).
01-28-2021 07:59 AM
Good catch. I updated my ticket and will let you know what they come back with.
01-28-2021 08:34 AM
According to all our evidence, the signatures will work for both variants.
Guess we are already covered. It might be good if someone could test this?
01-28-2021 12:43 PM
FYI these are set to Alert by default. I just set ours to Drop.
01-28-2021 12:52 PM
Yes, however if you have your policy set by severity blocking everything medium and higher requires no action:
I always suggest blocking medium and higher. Double checking is a great idea!
01-28-2021 12:53 PM
Here is how I suggest these settings be setup:
01-28-2021 01:01 PM
I appreciate the heads up.,
01-28-2021 01:02 PM
01-28-2021 01:19 PM
Good call. I forgot we had it setup like that as well.
02-01-2021 12:51 PM
Hi All, @OtakarKlier @silvioopt @Coldfirex
I am looking for answers to my customer questions, hope you can help me.
Our customer dont have threat subscription but NAT was configured on firewalls, so installing updated content package on firewalls will not mitigate this issue.
Any work around without threat subscription??
Does decryption should be enabled as well to successfully mitigate this issue??
Does this applies to all types of NAT configuration like 1-1 NAT , many to one NAT etc.??
what are the exact configuration changes needed on threat profiles that applies only to NAT traffic to mitigate this issue.
02-01-2021 12:55 PM
I recommend a subscription to the following:
You can use something else for secure DNS or can use Palo Alto's. But this is the reason why we pay for the subscriptions.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!