Secure Packet Flow (PAN-OS)
Secure Packet Flow (PAN-OS)
(PAN-OS)
{ Prepared By
Shaikat Ahmed
PCNSE, CCNA, JNCIA, NSE
Admin-Cloud Infrastructure & Network Security
Packet Flow Sequence in PAN-OS
INGRESS STAGE
PACKET PARSING
TUNNEL DECAPSULATION
IP DEFRAGMENTATION
Packet Processing State
FIREWALL SESSION LOOKUP
SECURITY PROCESSING
CAPTIVE PORTAL
CONTENT INSPECTION
FORWARDING [EGRESS]
Identifies a forwarding domain for the packet
Performs QoS shaping
Firewall carries out fragmentation based on
MTU
IPSec/SSL-VPN tunnel encryption is performed
and packet forwarding is reevaluated if the
egress interface is tunnel interface.
Finally the packet is transmitted out of the
physical egress interface
Interested for more?? Let’s dive
into deep ocean of packets
Ingress State [Flow Debugging]
The ingress stage receives packets from the
network interface, parses those packets, and
then determines whether a given packet is
subject to further inspection.
errors exist.
The tunnel interface associated with the tunnel
is assigned to the packet as its new ingress
interface and then the packet is fed back
through the parsing process, starting with the
packet header defined by the tunnel type.
Ingress State [IP DEFRAGMENTATION]
The firewall parses IP fragments, reassembles
using the defragmentation process, and then
feeds the packet back to the parser starting with
the IP header
packet.
Source and destination ports: Port numbers from TCP/UDP
protocol headers
For non-TCP/UDP, different protocol fields are used (e.g. for
ICMP the ICMP identifier and sequence numbers are used
For IPSec terminating on device the Security Parameter Index
(SPI) is used, and for unknown, a constant reserved value is
used to skip Layer-4 match).
Firewall Session Lookup
[Cont.]
Protocol: The IP protocol number from the IP header is used to
derive the flow key .
Security zone: This field is derived from the ingress interface at
which a packet arrives
The firewall stores active flows in the flow lookup table. When a
packet is determined to be eligible for firewall inspection, the
firewall extracts the 6-tuple flow key from the packet and then
performs a flow lookup to match the packet with an existing flow
Each flow has a client and server component, where the client
IPv4 unicast inspect & forward inspect & forward inspect & forward inspect & drop
forward, but inspect only if forward, but inspect drop, but inspect only
inspect and
IPv6 IPv6 firewalling is only if IPv6 firewalling if IPv6 firewalling is
forward if enabled
on (default) is on (default) on (default)
Virtual Wire Egress interface is the peer interface configured in the virtual wire
The firewall uses the route lookup table to determine the next hop,
Layer - 3 or discards the packet if there is no match.
Processing State [NAT Policy Lookup]
allocation) .
If the application has not been identified, the session timeout values
are set to default value of the transport protocol. You can configure
these global timeout values from the Firewall’s device
settings. Application specific timeout values override the global
settings, and will be the effective timeout values for the session once
application is identified .
SESSION ALLOCATION [Cont.]
After setup, session installation takes place:
The firewall then sends the packet into Session Fast Path
phase for security processing.
Processing State [FIREWALL SESSION
FAST PATH
A packet that matches an existing session will enter the
fast path.
starts with Layer-2 to Layer-4 firewall processing -
If the session is in discard state, then the firewall
applicable.
FIREWALL SESSION FAST PATH
[SECURITY PROCESSING]
A packet matching an existing session is subject to
further processing (application identification and/or
content inspection) if packet has TCP/UDP data
(payload), or it is a non-TCP/UDP packet.
If the firewall does not detect the session application -
Digest
Since captive portal is applicable to http traffic and also
supports a URL category based policy lookup, this can
be kicked in only after the TCP handshake is
completed and the http host headers are available in the
session exchange.
Processing State [Application Identification –
APP-ID]
The firewall first performs an application-override policy
lookup to see if there is a rule match.
Nutshell:
egress process
Based on the MTU of the egress interface and the
References: