<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Permit statement isn't capturing all the traffic in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/permit-statement-isn-t-capturing-all-the-traffic/m-p/504520#M166</link>
    <description>&lt;P&gt;We have a school tied to our organization that's using a PA-850 and is running 10.1.6, and we're trying to get Battle.net working. After considerable troubleshooting, I put in a rule at the very top to permit the "zESports" zone to get to any IP on any zone. See the eSport_to_all_rule image. For some reason, some packets completely bypass this rule and makes their way to the very last rule, which is the interzone-default. This rule resets both ends of the connection, and it's shown in the eSports_reset-both image below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://choctawnationofoklahoma-my.sharepoint.com/personal/1005721_choctawnation_com/Documents/Microsoft%20Teams%20Chat%20Files/eSports_to_all.png?csf=1&amp;amp;web=1&amp;amp;e=z12sk1" target="_self"&gt;eSport_to_all_rule&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://choctawnationofoklahoma-my.sharepoint.com/personal/1005721_choctawnation_com/Documents/Microsoft%20Teams%20Chat%20Files/eSports_reset-both.png?csf=1&amp;amp;web=1&amp;amp;e=Fge9LW" target="_self"&gt;eSports_reset-both&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most of the packets between the two hosts traverse just fine, but the resets come generally after a GET request. I'm not seeing the destination IP in any of the logs, outside of the Traffic log. Does anyone have an idea? Thanks&lt;/P&gt;</description>
    <pubDate>Fri, 17 Jun 2022 17:18:21 GMT</pubDate>
    <dc:creator>abaskerville</dc:creator>
    <dc:date>2022-06-17T17:18:21Z</dc:date>
    <item>
      <title>Permit statement isn't capturing all the traffic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/permit-statement-isn-t-capturing-all-the-traffic/m-p/504520#M166</link>
      <description>&lt;P&gt;We have a school tied to our organization that's using a PA-850 and is running 10.1.6, and we're trying to get Battle.net working. After considerable troubleshooting, I put in a rule at the very top to permit the "zESports" zone to get to any IP on any zone. See the eSport_to_all_rule image. For some reason, some packets completely bypass this rule and makes their way to the very last rule, which is the interzone-default. This rule resets both ends of the connection, and it's shown in the eSports_reset-both image below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://choctawnationofoklahoma-my.sharepoint.com/personal/1005721_choctawnation_com/Documents/Microsoft%20Teams%20Chat%20Files/eSports_to_all.png?csf=1&amp;amp;web=1&amp;amp;e=z12sk1" target="_self"&gt;eSport_to_all_rule&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://choctawnationofoklahoma-my.sharepoint.com/personal/1005721_choctawnation_com/Documents/Microsoft%20Teams%20Chat%20Files/eSports_reset-both.png?csf=1&amp;amp;web=1&amp;amp;e=Fge9LW" target="_self"&gt;eSports_reset-both&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most of the packets between the two hosts traverse just fine, but the resets come generally after a GET request. I'm not seeing the destination IP in any of the logs, outside of the Traffic log. Does anyone have an idea? Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 17:18:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/permit-statement-isn-t-capturing-all-the-traffic/m-p/504520#M166</guid>
      <dc:creator>abaskerville</dc:creator>
      <dc:date>2022-06-17T17:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: Permit statement isn't capturing all the traffic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/permit-statement-isn-t-capturing-all-the-traffic/m-p/504537#M167</link>
      <description>&lt;P&gt;Not seeing the images, you put them on OneDrive or something... need to post them here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By default, the intrazone-default and interzone-default rules do not log traffic. Select each from the Security rule list and then click the "Override" button in the bottom task bar and you can then enable logging on the rule. You may also want to enable both start and end logging for the defaults and your special rule. The 2 Traffic log entries may then tell you something about the traffic being identified initially under one rule and then being reclassified to a different rule later.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is important to remember that the PA doesn't work on top-down processing like a traditional firewall, it works on most-specific-match processing. So if the detected category/application/etc. changes as the PA processes more and more packets in the stream, it may suddenly jump to a different Security rule.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 18:09:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/permit-statement-isn-t-capturing-all-the-traffic/m-p/504537#M167</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-06-17T18:09:48Z</dc:date>
    </item>
    <item>
      <title>Re: Permit statement isn't capturing all the traffic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/permit-statement-isn-t-capturing-all-the-traffic/m-p/504547#M168</link>
      <description>&lt;P&gt;intrazone-default was configured to log traffic, so we do see it. We just got it fixed - the application was set to 'any' but the service was set to 'application-default.' Changing the latter to 'any' fixed the problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your time on this, and I'm selecting your response as the answer as it describes the behavior we were seeing.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 18:55:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/permit-statement-isn-t-capturing-all-the-traffic/m-p/504547#M168</guid>
      <dc:creator>abaskerville</dc:creator>
      <dc:date>2022-06-17T18:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: Permit statement isn't capturing all the traffic</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/permit-statement-isn-t-capturing-all-the-traffic/m-p/504583#M172</link>
      <description>&lt;P&gt;Ah yes... I have been bit by the any/application-default as well when I had a "deny all" rule with logging and yet some traffic was still making it to the intra/interzone-default rules (before I learned how to enable logging there). I should have thought of that initially.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 20:50:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/permit-statement-isn-t-capturing-all-the-traffic/m-p/504583#M172</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-06-17T20:50:32Z</dc:date>
    </item>
  </channel>
</rss>

