<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to decode palo alto netflow app-id from hex value in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-decode-palo-alto-netflow-app-id-from-hex-value/m-p/564736#M2064</link>
    <description>&lt;P&gt;Hi,&lt;BR /&gt;I am sending Palo alto netflow to a Linux server. While I capture NetFlow from the server and open it on Wireshark I cannot see appid in plain text format. I only see the hex code. I have attached some screenshot below here.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssovee_0-1699418558527.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/55017i29C9F5908C88691E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ssovee_0-1699418558527.png" alt="ssovee_0-1699418558527.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssovee_1-1699418578215.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/55018i50EFFF75DA7C72C7/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ssovee_1-1699418578215.png" alt="ssovee_1-1699418578215.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssovee_2-1699418616114.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/55019i3343D410D2AB285D/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ssovee_2-1699418616114.png" alt="ssovee_2-1699418616114.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Is there any way to decode this hex code to a plain text app-id?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Nov 2023 04:45:38 GMT</pubDate>
    <dc:creator>ssovee</dc:creator>
    <dc:date>2023-11-08T04:45:38Z</dc:date>
    <item>
      <title>How to decode palo alto netflow app-id from hex value</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-decode-palo-alto-netflow-app-id-from-hex-value/m-p/564736#M2064</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;I am sending Palo alto netflow to a Linux server. While I capture NetFlow from the server and open it on Wireshark I cannot see appid in plain text format. I only see the hex code. I have attached some screenshot below here.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssovee_0-1699418558527.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/55017i29C9F5908C88691E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ssovee_0-1699418558527.png" alt="ssovee_0-1699418558527.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssovee_1-1699418578215.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/55018i50EFFF75DA7C72C7/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ssovee_1-1699418578215.png" alt="ssovee_1-1699418578215.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssovee_2-1699418616114.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/55019i3343D410D2AB285D/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ssovee_2-1699418616114.png" alt="ssovee_2-1699418616114.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Is there any way to decode this hex code to a plain text app-id?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 04:45:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-decode-palo-alto-netflow-app-id-from-hex-value/m-p/564736#M2064</guid>
      <dc:creator>ssovee</dc:creator>
      <dc:date>2023-11-08T04:45:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to decode palo alto netflow app-id from hex value</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-decode-palo-alto-netflow-app-id-from-hex-value/m-p/570651#M2291</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/310948"&gt;@ssovee&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;As mentioned here &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/monitoring/netflow-monitoring/configure-netflow-exports" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/monitoring/netflow-monitoring/configure-netflow-exports&lt;/A&gt; PAN firewall will refresh NetFlow template based on the time interval you specified in the NetFlow server profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From your screenshare it looks like PAN firewall is already configured to send PAN-OS specific fields, which include App-ID. However wireshark is unable to recognize this field, and suspect the reason for that is your capture didn't capture NetFlow Template packet sent from the firewall. &lt;/P&gt;
&lt;P&gt;You can see example here, how WireShark is able to identify all fields when template is being captured - &lt;A href="https://helpdesk.kaseya.com/hc/en-gb/articles/115003522631-How-to-view-NetFlow-in-WireShark" target="_blank"&gt;https://helpdesk.kaseya.com/hc/en-gb/articles/115003522631-How-to-view-NetFlow-in-WireShark&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 13:51:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-decode-palo-alto-netflow-app-id-from-hex-value/m-p/570651#M2291</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-12-21T13:51:43Z</dc:date>
    </item>
  </channel>
</rss>

