@MyPrepaidCente wrote: In my case, the team is performing a vulnerability assessment on PA820 Vulnerability Title: TCP timestamp response. Description: The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their TCP timestamps. The scanning was running to the MGMT IP, How to disable the timestamp response. According to RFC 1323 (TCP Extensions for High Performance) TCP Timestamp is used for two main mechanisms: PAWS (Protect Against Wrapped Sequence) RTT (Round Trip Time) PAWS - defense mechanism for identification and rejection of packets that arrived in other wrapping sequence (data integrity). Round Trip Time - time for packet to get to the destination and sent acknowledgment back to the device it originated.
... View more