<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA dropping certain MSSQL EXEC statements for no apparent reason in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/501409#M148</link>
    <description>&lt;P&gt;I'm not quite sure I understand what you mean by checking global counters. Do you mean the traffic log packet counters vs actual packets in the traffic dumps?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the traffic logs:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2022-06-07_101819.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/41651iB073332B5FD41507/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2022-06-07_101819.png" alt="2022-06-07_101819.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA packet capture, from port 54840 to server:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 41 packets from client (including packet that goes missing, 6 retransmissions, and TCP RST)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 27 packets from server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internal router packet capture, from port 54840 to server:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 33 packets from client (missing final exec job start, 6 retransmissions, TCP RST)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 38 packets from server (10 TCP keepalives because the server never got the ACK that should have come in the missing packet and a TCP RST do to no ACK responses)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA packet capture, from port 54843 to server:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 16 packets from client (including packet that goes missing, 6 retransmissions, and TCP RST)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 6 packets from server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internal router packet capture, from port 54843 to server:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 8 packets&amp;nbsp; (missing final exec job start packet, 6 retransmissions, TCP RST)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 17 packets from server&amp;nbsp;(10 TCP keepalives and a TCP RST)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA seems to drop the exec job start packet and all subsequent traffic in the session (though the session still seem to be active in the CLI).&lt;/P&gt;</description>
    <pubDate>Tue, 07 Jun 2022 17:47:08 GMT</pubDate>
    <dc:creator>Adrian_Jensen</dc:creator>
    <dc:date>2022-06-07T17:47:08Z</dc:date>
    <item>
      <title>PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/500549#M144</link>
      <description>&lt;P&gt;Having a weird issue with a remote client connection to over VPN to multiple internal MSSQL servers. A particular SQL EXEC query packet is getting dropped in the middle of an SQL session. Security ruleset allows the communication under a VPN to TRUST mssql-db-unencrypted rule (made a separate test rule with explicit any/any allows and no filtering as well). No packet decryption between source and destination. Session connects, passes multiple queries/responses, and then times out/resets on the client side when the packet drops happens.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security logs show traffic allowed thru expected rules with no problems, no alerts, not decrypted. No relevant threat logs. Packet dumps on the PA show the client making multiple SQL queries and the server responding, then the client makes a EXEC command and repeats it multiple times before timing out/resetting. Packet dumps from the core router behind the PA show the multiple queries/responses, but not the final EXEC query, the PA has dropped the packet without indicating why. Anyone seen this? Anywhere else to look for errors?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; --&amp;gt; client login&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;-- server response&lt;/P&gt;&lt;P&gt;&amp;nbsp; --&amp;gt; SET LOCK_TIMEOUT 10000&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;-- done&lt;/P&gt;&lt;P&gt;&amp;nbsp; --&amp;gt; select SERVERPROPERTY(N'servername')&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;-- done&lt;/P&gt;&lt;P&gt;[ multiple declaration and select statements back and forth to server getting ready for scripted job ]&lt;/P&gt;&lt;P&gt;&amp;nbsp; --&amp;gt; exec msbd.sp_help_job &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/2861"&gt;@job&lt;/a&gt;_id='&amp;lt;GUID&amp;gt;'&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;-- done&lt;/P&gt;&lt;P&gt;&amp;nbsp; --&amp;gt; EXEC msdb.sp_start_job &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/2861"&gt;@job&lt;/a&gt;_id=N'&amp;lt;GUID&amp;gt;'&lt;/P&gt;&lt;P&gt;[ no response from server - internal packet dump shows this packet never passed by the PA ]&lt;/P&gt;&lt;P&gt;&amp;nbsp; --&amp;gt; [ multiple retransmissions ]&lt;/P&gt;&lt;P&gt;[ no response from server - internal packet dump shows these packet never passed by the PA ]&lt;/P&gt;&lt;P&gt;&amp;nbsp; -&amp;gt; TCP RST&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 19:16:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/500549#M144</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-06-06T19:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/500946#M145</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Just to rule out L7 processing, I'd make an application-override to a custom app-id just to kill off any and all inspection through the firewall. Then have them run it again with all profiles disabled on a test rule for the traffic and see if that doesn't allow the traffic to pass without issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 02:11:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/500946#M145</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-06-07T02:11:38Z</dc:date>
    </item>
    <item>
      <title>Re: PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/501231#M146</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Have you checked global counters with packet filters matching only this specific session?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 14:32:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/501231#M146</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-06-07T14:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/501408#M147</link>
      <description>&lt;P&gt;Created a custom app override and applied to security rule, no security profiles (already had tried this as well). Sessions show up in CLI during test in custom app. Traffic logs show session start and end in expected rule with application identified as the override. Packet dumps still show missing exec start job MSSQL/TDS packet from client to server behind the PA...&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 17:08:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/501408#M147</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-06-07T17:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/501409#M148</link>
      <description>&lt;P&gt;I'm not quite sure I understand what you mean by checking global counters. Do you mean the traffic log packet counters vs actual packets in the traffic dumps?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the traffic logs:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2022-06-07_101819.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/41651iB073332B5FD41507/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2022-06-07_101819.png" alt="2022-06-07_101819.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA packet capture, from port 54840 to server:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 41 packets from client (including packet that goes missing, 6 retransmissions, and TCP RST)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 27 packets from server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internal router packet capture, from port 54840 to server:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 33 packets from client (missing final exec job start, 6 retransmissions, TCP RST)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 38 packets from server (10 TCP keepalives because the server never got the ACK that should have come in the missing packet and a TCP RST do to no ACK responses)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA packet capture, from port 54843 to server:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 16 packets from client (including packet that goes missing, 6 retransmissions, and TCP RST)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 6 packets from server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internal router packet capture, from port 54843 to server:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 8 packets&amp;nbsp; (missing final exec job start packet, 6 retransmissions, TCP RST)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - 17 packets from server&amp;nbsp;(10 TCP keepalives and a TCP RST)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA seems to drop the exec job start packet and all subsequent traffic in the session (though the session still seem to be active in the CLI).&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 17:47:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/501409#M148</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-06-07T17:47:08Z</dc:date>
    </item>
    <item>
      <title>Re: PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/501569#M149</link>
      <description>&lt;P&gt;&lt;LI-PRODUCT title="NGFW" id="NGFW"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2022 02:52:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/501569#M149</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2022-06-08T02:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/502069#M150</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt; means to check the global counters as explained &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloNCAS" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;here&lt;/STRONG&gt;&lt;/A&gt; to help you isolate the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With the command "&lt;EM&gt;show counter globa&lt;/EM&gt;l" you will see ALL the counters for ALL the traffic so it's best to setup a filter to isolate the counters which can help you troubleshoot an issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-PRODUCT title="NGFW" id="NGFW"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 09 Jun 2022 08:18:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/502069#M150</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2022-06-09T08:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/502259#M151</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Apologies for not being very clear. Please try to follow the steps from the link provided by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;, I am interested to see the output.&lt;/P&gt;
&lt;P&gt;When you created the custom application for the override, did you select parent application, or leave it with "None"?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2022 14:43:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/502259#M151</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-06-09T14:43:08Z</dc:date>
    </item>
    <item>
      <title>Re: PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/502353#M152</link>
      <description>&lt;P&gt;Ah... interesting... I had no idea you could use the packet monitor filter settings to filter global counters to a specific source/destination.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did another test and packet capture (using the receive stage with a filter for source/destination on any ingress interface) - capture shows same details as previous tests. This time I also added a packet monitor for the drop stage - no resulting captured packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;adrian.admin@PA-3020-Dr&amp;gt; show counter global filter packet-filter yes delta yes&lt;BR /&gt;&lt;BR /&gt;Global counters:&lt;BR /&gt;Elapsed time since last sampling: 69.130 seconds&lt;BR /&gt;&lt;BR /&gt;name value rate severity category aspect description&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;pkt_outstanding 416 6 info packet pktproc Outstanding packet to be transmitted&lt;BR /&gt;pkt_alloc 490 7 info packet resource Packets allocated&lt;BR /&gt;pkt_inconsist 129 1 info packet pktproc Packet buffer pointer inconsistent&lt;BR /&gt;session_allocated 4 0 info session resource Sessions allocated&lt;BR /&gt;session_installed 4 0 info session resource Sessions installed&lt;BR /&gt;session_unverified_rst 2 0 info session pktproc Session aging timer modified by unverified RST&lt;BR /&gt;flow_fwd_mtu_exceeded 55 0 info flow forward Packets lengths exceeded MTU&lt;BR /&gt;flow_dos_rule_nomatch 4 0 info flow dos Packets not matched DoS policy&lt;BR /&gt;flow_ipfrag_frag 110 1 info flow ipfrag IP fragments transmitted&lt;BR /&gt;flow_host_pkt_xmt 300 4 info flow mgmt Packets transmitted to control plane&lt;BR /&gt;flow_host_vardata_rate_limit_ok 245 3 info flow mgmt Host vardata not sent: rate limit ok&lt;BR /&gt;flow_tunnel_ipsec_esp_encap 129 1 info flow tunnel Packet encapped: IPSec ESP&lt;BR /&gt;flow_tunnel_encap_resolve 129 1 info flow tunnel tunnel structure lookup resolve&lt;BR /&gt;flow_tcp_cksm_sw_validation 116 1 info flow pktproc Packets for which TCP checksum validation was done in software&lt;BR /&gt;appid_override 2 0 info appid pktproc Application identified by override rule&lt;BR /&gt;appid_proc 2 0 info appid pktproc The number of packets processed by Application identification&lt;BR /&gt;dfa_sw 12 0 info dfa pktproc The total number of dfa match using software&lt;BR /&gt;ctd_sml_exit_detector_i 2 0 info ctd pktproc The number of sessions with sml exit in detector i&lt;BR /&gt;appid_bypass_no_ctd 2 0 info appid pktproc appid bypass due to no ctd&lt;BR /&gt;ctd_handle_reset_and_url_exit 2 0 info ctd pktproc Handle reset and url exit&lt;BR /&gt;ctd_run_detector_i 2 0 info ctd pktproc run detector_i&lt;BR /&gt;ctd_fwd_err_tcp_state 2 0 info ctd pktproc Forward to varrcvr error: TCP in establishment when session went away&lt;BR /&gt;aho_sw_offload 15 0 info aho pktproc The total number of software aho offload&lt;BR /&gt;ctd_pscan_sw 18 0 info ctd pktproc The total usage of software for pscan&lt;BR /&gt;ctd_appid_reassign 2 0 info ctd pktproc appid was changed&lt;BR /&gt;ctd_process 2 0 info ctd pktproc session processed by ctd&lt;BR /&gt;ctd_pkt_slowpath 12 0 info ctd pktproc Packets processed by slowpath&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Total counters shown: 27&lt;BR /&gt;--------------------------------------------------------------------------------&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No drop severity shown in the delta over the test period. Also ran deltas shortly before and after the test with no drops reported. When I created the custom application I set the categories to the same as the normal mssql-db-unencrypted, but I left ParentApp as "none" and Risk as "1".&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2022 17:10:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/502353#M152</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-06-09T17:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/502619#M153</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I cannot say I fully understand the output, so the only think I noticed is the "Packets lenght exceeded MTU", but I would assume this counter should reflect the packets to the GP client, while the EXEC command should be &lt;U&gt;from GP&lt;/U&gt; user, right? This shouldn't be a problem unless DF flag is set, but never the less, can you check what MTU is used by your GP clients? - &lt;A href="https://docs.paloaltonetworks.com/globalprotect/5-2/globalprotect-app-new-features/new-features-released-in-gp-app/configurable-maximum-transmission-unit-for-globalprotect-connections" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/5-2/globalprotect-app-new-features/new-features-released-in-gp-app/configurable-maximum-transmission-unit-for-globalprotect-connections&lt;/A&gt; (around the bottom of the link is mentioned how to confirm MTU value)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would assume it will be difficult to organize, but is there a way you can test if the client is not connected with GP, but still traffic pass through the firewall? Connect a laptop directly to FW and test EXEC command again, or have the user connected to different network that will still route through the firewall to reach the server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Going back to the packet capture - Which stages are you configuring for the packet capture on the firewall? - &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;As mentioned in the link receive stage will show the packet ingressing the firewall, while transmite stage will show the same packets egressing the firewall. Try to set the two stages to capture in separate, can you confirm that you see the EXEC command packet in the "receive" file, but it is not in the "transmit" file?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 13:00:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/502619#M153</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-06-10T13:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/502766#M154</link>
      <description>&lt;P&gt;GP MTU is set to the default 1400. Most of the packets are smaller than that, a few at 1414 bytes (1400 plus ethernet header). The packet being dropped is only 232 total (218 plus ethernet header). there are multiple 200-300 and 1414 byte packets immediately before it that go thru.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was capturing in the receive and drop stage on the PA, and another capture on my core router to/from the destination server. Weirdly... the dropped packet does show up in a transmit stage capture on the PA... Not sure what to make of that when it doesn't show up at the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, I don't really have a user segment (other than the VPN clients) that go thru the PA to get to the internal DB servers to test the dropped packets. I will have to think a bit if that is possible. The only thing I can think of is from the DMZ, but that isn't really setup for users to do SQL queries from, just DMZ servers to specific internal services.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 17:24:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/502766#M154</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-06-10T17:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/502929#M155</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My idea was to eliminate possible issues with traffic from GP, but if the EXEC command can be seen in the transmit packet capture of the firewall, probably it is better as next step to confirm this.&lt;/P&gt;
&lt;P&gt;In your original post you mentiond that you were capturing on the core switch after the firewall. I would assume span/mirror port, right? Which port did you monitor? Can you monitor the port on the switch were the traffic egress the firewall and check if the EXEC command vissible in transmit capture on the FW is also visible ingressing on the switch? &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What version are you running?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jun 2022 07:14:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/502929#M155</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-06-12T07:14:11Z</dc:date>
    </item>
    <item>
      <title>Re: PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/503180#M156</link>
      <description>&lt;P&gt;Yes, my capture on the primary site core switch/router was on a VLAN spanning multiple ports that delivers traffic to our internal ACI/server hosting segment. The PA is at our backup site, connected to our primary site by multiple PtP circuits between the backup site core and the primary site core. I am waiting for the user to test again connected to our primary site PA VPN just to make sure its not dropping across the PtP.... but I don't see what could possibly be affecting it there... Then going to setup more packet captures at ingress/egress of every device in the path.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently running 9.1.13-h3 at both primary and backup sites.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2022 15:57:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/503180#M156</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-06-13T15:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: PA dropping certain MSSQL EXEC statements for no apparent reason</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/504308#M157</link>
      <description>&lt;P&gt;Had a chance to run more tests and packet captures, also test thru alternate VPN gateway. Same result, PA shows SQL EXEC packet but doesn't pass to internal router:&lt;/P&gt;&lt;P&gt;&amp;nbsp; [internet] &amp;lt;-VPN-&amp;gt; [PaloAlto (*1*2)] &amp;lt;--&amp;gt; [Core Router (*3*4)] &amp;lt;--&amp;gt; [SQL Server]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*1 - PaloAlto RX capture shows SQL client packets to and from SQL server, last client packet with '"EXEC msdb.dbo.sp_start_job ..." command followed by multiple client retransmission, no further response from server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*2 - PaloAlto TX capture shows SQL client packets to SQL server, including last EXEC packet and restransmissions. Does not show server response packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*3 - Cisco Core router capture on interface connected to PaloAlto show SQL client packets to and from SQL server. Client packets end at ACK to previous SQL command/response before last client EXEC packet. No retransmissions seen. Server sending keep-alive packets to client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*4 - Cisco core router capture on interface connected to SQL server network. Same packets as *3.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No packets in a PaloAlto drop capture. PA seems to be ending the session when it hits the final EXEC statement.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2022 18:46:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-dropping-certain-mssql-exec-statements-for-no-apparent-reason/m-p/504308#M157</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-06-16T18:46:01Z</dc:date>
    </item>
  </channel>
</rss>

