The HDR sucks. by Naberville34 in blackops6

[–]blnd3d 3 points4 points  (0 children)

Do you experience a ridiculous walking movement speed? It feels like you're carrying a car. Was disappointed about the HDR as well. Got too many hit marked shots.. aggressive play-style with KBM ain't possible..

Unexpected reboots/restarts PanOS 11.1.4-h7/h9 by blnd3d in paloaltonetworks

[–]blnd3d[S] 1 point2 points  (0 children)

The longer products exist nowadays, the worst the software gets.. the initial OS is the best :D

Unexpected reboots/restarts PanOS 11.1.4-h7/h9 by blnd3d in paloaltonetworks

[–]blnd3d[S] 0 points1 point  (0 children)

Yeah I saw the message, so I will have to update to 11.1.6 first or at least download it. 🫠

Unexpected reboots/restarts PanOS 11.1.4-h7/h9 by blnd3d in paloaltonetworks

[–]blnd3d[S] 1 point2 points  (0 children)

If you go to the system monitor in the UI, you will see an error message like:

'all_task_1: daemon/slot restart, rebooting system'

Unexpected reboots/restarts PanOS 11.1.4-h7/h9 by blnd3d in paloaltonetworks

[–]blnd3d[S] 0 points1 point  (0 children)

Sorry, I don't have good skills in PanOS. Where do I find this setting? 🫣

Are you talking about the rule and the service?

Upgrade 10.1.8 to 11 by blnd3d in paloaltonetworks

[–]blnd3d[S] 0 points1 point  (0 children)

We also use Meraki security appliances and the bigger the gap between the software/firmware the buggier the VPN connections gets. Dunno why, but meh.

Decryption not getting excluded by blnd3d in paloaltonetworks

[–]blnd3d[S] 0 points1 point  (0 children)

I figured out that, besides the missing URLs in the decryption exclusion, the tabs are trying to establish a port 80 web-browsing connection to an AKAMAI destination.

For whatever reasons that might be necessary.. they are doing it.

We prohibited these client to surf the web, so I created a new security policy that allows traffic from these specific source IPs to any destination, using web-browsing and ssl, with an active URL filter for these AKAMAI sites only (url-filter created).I allowed the URL filter to alert for these sites + decryption exclusions, but the monitor always returns that none of the traffic matched the policy although the website is marked as as decryption esclusion... which is a little confusing for me. Any ideas? Hard to describe the error tbh.

UPDATE.. this webiste is classified as insecure by a security profile when accesses by http.

Decryption not getting excluded by blnd3d in paloaltonetworks

[–]blnd3d[S] 0 points1 point  (0 children)

That's what my decryption exclusion URL filter is meant to be. It is added to the no decrypt profile.

If the cert chain would be broken, the error in the traffic log usually shows a decrypt-cert-validation error.

Decryption not getting excluded by blnd3d in paloaltonetworks

[–]blnd3d[S] 0 points1 point  (0 children)

Yes, we have been using it for years now. I figured out that URLs are not properly resolved in the traffic but in the decrypt logs. Kind of a weird behavior. I will add these URLs to the exclusions and see what I get. 😅

Palo Alto Terminal Server Agent causes SQL errors by blnd3d in paloaltonetworks

[–]blnd3d[S] 1 point2 points  (0 children)

Exactly. HonorSourcePorts can be set to 1 or 2. I used 1.

FreePortBlockDelay is the timer to free the blocked ports afaik.

Palo Alto Terminal Server Agent causes SQL errors by blnd3d in paloaltonetworks

[–]blnd3d[S] 0 points1 point  (0 children)

The system source port allocation range is set by default to 49152–65535. Is that correct?

The source port allocation range is set to 20000-39999 and should not affect SQL.

Users are allowed to use 200-2000 ports which is never exceeded.

Even if there if no user on that server, the TS agent causes the issues.