- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
11-02-2020 11:03 AM
A new research has demonstrated a technique that allow an attacker to bypass firewall protection and remotely access any TCP/UDP service on victim machine.
https://thehackernews.com/2020/11/new-natfirewall-bypass-attack-lets.html
12-02-2020 11:00 AM
It would be great to hear from someone at PAN on this exploit.
12-09-2020 08:52 PM
The attack Kill-Chain. Palo Alto Networks Firewall Deployment decryption to avoid inspection bypass for encrypted content and applications For internal clients not behind a NAT device, a source-ip classification profile may be a good
12-24-2020 02:41 PM
We produced the following IPS signatures to cover this threat:
NAT Slipstreaming Detection (59667)
NAT Slipstreaming Detection (59668)
NAT Slipstreaming Detection (59669)
NAT Slipstreaming Detection (59671)
NAT Slipstreaming Detection (59672)
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!