<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Implementing WAAS with Firewall in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/1477680#M49082</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can I ask what brand of firewalls you are using?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Zach&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 Jun 2010 12:44:45 GMT</pubDate>
    <dc:creator>Zach Seils</dc:creator>
    <dc:date>2010-06-24T12:44:45Z</dc:date>
    <item>
      <title>Implementing WAAS with Firewall</title>
      <link>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/1477679#M49081</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm about to run a WAAS implementation Project but I have got below prerequisites that it should be taken on firewalls from one of my colleague, can you please let me know whether this is true?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri;"&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #1f497d; font-size: 10pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt;1) disable &lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #1f497d; font-size: 11pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt;checking&lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: black; font-size: 10pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt; the &lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #1f497d; font-size: 11pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt;TCP&lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: black; font-size: 10pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt; &lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #1f497d; font-size: 11pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt;Sequence&lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: black; font-size: 10pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt; &lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #1f497d; font-size: 11pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt;Number&lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: black; font-size: 10pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt; &lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #1f497d; font-size: 11pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt;Fields &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri;"&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #1f497d; font-size: 11pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt;2) to allow TCP option modifications. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri;"&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #1f497d; font-size: 11pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri;"&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #1f497d; font-size: 11pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri;"&gt;&lt;SPAN lang="EN-US" style="font-family: &amp;amp;quot;Calibri&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #1f497d; font-size: 11pt; mso-fareast-font-family: SimSun; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;"&gt; Doing this may leave the Customer LAN environment vulnerable to DoS attacks.&amp;nbsp; In addition, Cisco has encountered many challenges getting WAAS to work even when both of these items have been changed on the FWs.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2010 23:30:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/1477679#M49081</guid>
      <dc:creator>a4ter</dc:creator>
      <dc:date>2010-06-23T23:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing WAAS with Firewall</title>
      <link>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/1477680#M49082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can I ask what brand of firewalls you are using?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Zach&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jun 2010 12:44:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/1477680#M49082</guid>
      <dc:creator>Zach Seils</dc:creator>
      <dc:date>2010-06-24T12:44:45Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing WAAS with Firewall</title>
      <link>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/1477681#M49083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They are Checkpoint firewalls.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jun 2010 03:56:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/1477681#M49083</guid>
      <dc:creator>a4ter</dc:creator>
      <dc:date>2010-06-28T03:56:21Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing WAAS with Firewall</title>
      <link>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/1477682#M49084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&amp;nbsp; I see the following options for deploying WAAS:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Disable a bunch of security checks on the firewall(s) to allow WAAS traffic to flow through&lt;/LI&gt;&lt;LI&gt;Use Direrected Mode in WAAS to tunnel optimized traffic through the firewall&lt;/LI&gt;&lt;LI&gt;Place the WAAS devices "outside" the firewalls so that the firewall(s) only see the LAN side (i.e. unoptimized) traffic&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm personally not a fan of (1) or (2) above, since they reduce the level of benefit provided by the firewall(s) or hide optimized traffic from them all together.&amp;nbsp; Option (3) may be an option,&amp;nbsp; but it depends on your topology.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have a topology diagram of your deployment that you can share?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Zach&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jun 2010 13:09:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/1477682#M49084</guid>
      <dc:creator>Zach Seils</dc:creator>
      <dc:date>2010-06-28T13:09:38Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing WAAS with Firewall</title>
      <link>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/1477683#M49085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Zach,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;our network is rather difficult to explain because they are not optimized and very complicated, it would be eaiser for us to put WAAS behind the firewall which will be easier for us but outside of Firewall that is a mass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;unfortunately I can not share the diagram due to our security policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for the option #1, what kind of port or protocol needs to be open? just wanted to feel how big they are.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Jun 2010 04:41:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/1477683#M49085</guid>
      <dc:creator>a4ter</dc:creator>
      <dc:date>2010-06-29T04:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing WAAS with Firewall</title>
      <link>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/1477684#M49086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ports/protocols you need to open are the same as WAAS not being there.&amp;nbsp; It's the security/normalization checks that you'll have to turn off.&amp;nbsp; The problems I would anticipiate are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Unknown TCP Options - We use TCP option 33 (0x21) for auto-discovery between WAAS devices.&amp;nbsp; The firewall should be configured to allow this option to change unmodified.&lt;/LI&gt;&lt;LI&gt;TCP Sequence Numbers - TCP sequence number checking for optimized connections will need to be disabled.&lt;/LI&gt;&lt;LI&gt;Deep Packet Inspection - DPI for packets where we have performed compression will likely fail.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Zach&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Jun 2010 11:56:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/1477684#M49086</guid>
      <dc:creator>Zach Seils</dc:creator>
      <dc:date>2010-06-29T11:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing WAAS with Firewall</title>
      <link>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/4034875#M51177</link>
      <description>&lt;P&gt;Hi Zach,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have same issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have Dynamic IP-IPSec Tunnel build between Palo Alto(Cluster) and Cradlepoint (Remote Office).&lt;/P&gt;&lt;P&gt;Behind the Cradlepoint and Palo Alto we have WAAS devices.&lt;/P&gt;&lt;P&gt;When WAAS is enabled, Palo Alto is dropping packets.&lt;/P&gt;&lt;P&gt;We have created Zone protection profile for allowing non-syn-tcp traffic.&lt;/P&gt;&lt;P&gt;But still palo alto is dropping traffic.&lt;/P&gt;&lt;P&gt;What need to be done on Palo Alto to allow WAAS -TCP 0x21?&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dev&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2020 18:41:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/implementing-waas-with-firewall/m-p/4034875#M51177</guid>
      <dc:creator>devnetsec</dc:creator>
      <dc:date>2020-02-24T18:41:58Z</dc:date>
    </item>
  </channel>
</rss>

