<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Searching for missing logs in Next Gen Firewall monitor log. in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/searching-for-missing-logs-in-next-gen-firewall-monitor-log/m-p/409943#M138</link>
    <description>&lt;P&gt;I am trying to firgure out two things.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;background&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a Cisco ASA VPN concentrator that comes to my PA-5220 then goes to an application server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am having issues where i see logs in the ASA of traffic coming from the far end point of the tunnel on a constant basis, then going to the application server. I am not constantly seeing any logs in the Monitor. The application vendor acknowlegdes the traffic as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The logs I see is about 20 -30 minutes most of the time.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More interestingly is I have many customers coming in the ASA to the same Policy going to same application server on the same port. Those other IPs are showing constant logging.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Second issue is we see latency traffic between the two sides.. The application should have constant traffic every second or quicker.. What see is sometimes on a constant basis there is delays from 5 to 45 seconds.. again no logs in the PA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First how can I check for the traffic in CLI ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition How Can I check to traffic to see if the PA is possibly causing the latency.?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 04 Jun 2021 03:06:27 GMT</pubDate>
    <dc:creator>Eric_Barger</dc:creator>
    <dc:date>2021-06-04T03:06:27Z</dc:date>
    <item>
      <title>Searching for missing logs in Next Gen Firewall monitor log.</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/searching-for-missing-logs-in-next-gen-firewall-monitor-log/m-p/409943#M138</link>
      <description>&lt;P&gt;I am trying to firgure out two things.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;background&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a Cisco ASA VPN concentrator that comes to my PA-5220 then goes to an application server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am having issues where i see logs in the ASA of traffic coming from the far end point of the tunnel on a constant basis, then going to the application server. I am not constantly seeing any logs in the Monitor. The application vendor acknowlegdes the traffic as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The logs I see is about 20 -30 minutes most of the time.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More interestingly is I have many customers coming in the ASA to the same Policy going to same application server on the same port. Those other IPs are showing constant logging.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Second issue is we see latency traffic between the two sides.. The application should have constant traffic every second or quicker.. What see is sometimes on a constant basis there is delays from 5 to 45 seconds.. again no logs in the PA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First how can I check for the traffic in CLI ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition How Can I check to traffic to see if the PA is possibly causing the latency.?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jun 2021 03:06:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/searching-for-missing-logs-in-next-gen-firewall-monitor-log/m-p/409943#M138</guid>
      <dc:creator>Eric_Barger</dc:creator>
      <dc:date>2021-06-04T03:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for missing logs in Next Gen Firewall monitor log.</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/searching-for-missing-logs-in-next-gen-firewall-monitor-log/m-p/409990#M139</link>
      <description>&lt;P&gt;So the Palo Alto sees clean traffic without any VPN as the VPN concentrator is the ASA? Do you have split tunnel configured on the ASA that can cause asymmetrical routing and not all traffic going to the Palo Alto when reachig the app servers?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another thing to look for is the application shift on the Palo Alto firewall as when for example the traffic is ssl it will pass the security policy rule selection and after the decryption on Palo Alto and it is seen that the traffic google, facebook etc. it will again pass the security rule match from top to bottom as this is called application shift. Maybe you have application shift that after that matches a rule that is without "Log at the session end enabled".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWZCA0" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWZCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm1aCAC" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm1aCAC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the latency it is the best to check the global counters by filter by source and destination for something that can cause issues and to do pcap capture at &lt;SPAN&gt;&lt;SPAN class="richTextArea slds-text-longform tile__title red-txt"&gt;&lt;STRONG&gt;receive&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; and &lt;SPAN&gt;&lt;SPAN class="richTextArea slds-text-longform tile__title red-txt"&gt;&lt;STRONG&gt;transmit&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; stage for the traffic in the two directions from the client to server and server to client to see if the firewall causes the&amp;nbsp; latency issues. Also you may enable flow basic and flow log option "appid" to see the application shift if you need it. Before months I have made article for such issues:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/palo-alto-checking-for-drops-rejects-discards-slowness-latency/m-p/402102#M91777" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/general-topics/palo-alto-checking-for-drops-rejects-discards-slowness-latency/m-p/402102#M91777&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 29 May 2021 08:16:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/searching-for-missing-logs-in-next-gen-firewall-monitor-log/m-p/409990#M139</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2021-05-29T08:16:44Z</dc:date>
    </item>
    <item>
      <title>Re: Searching for missing logs in Next Gen Firewall monitor log.</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/searching-for-missing-logs-in-next-gen-firewall-monitor-log/m-p/418044#M140</link>
      <description>&lt;P&gt;Hey Eric,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Q.How can I check for the traffic in CLI ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;A. #show session all (I recommend using the filter command to only match the sessions your after). Alternatively you can go to the session browser on the GUI.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Q. How Can I check to traffic to see if the PA is possibly causing the latency?&lt;/P&gt;&lt;P&gt;A. I find the best way in determining this is to complete a packet capture and look at the timestamps between packets. There's a great article you can find here on how to do it on a NGFW --&amp;gt;&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jul 2021 08:39:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/searching-for-missing-logs-in-next-gen-firewall-monitor-log/m-p/418044#M140</guid>
      <dc:creator>RoutingWithJon</dc:creator>
      <dc:date>2021-07-09T08:39:51Z</dc:date>
    </item>
  </channel>
</rss>

