<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: delayed traffic logging in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/delayed-traffic-logging/m-p/1002315#M5357</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/283870"&gt;@itassetbenilde&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please verify the traffic log setting configuration, as logging is depends on security policy log setting configuration. Please refer the below kb for more details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clt5CAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clt5CAC&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 10 Jan 2025 04:13:11 GMT</pubDate>
    <dc:creator>mshekh</dc:creator>
    <dc:date>2025-01-10T04:13:11Z</dc:date>
    <item>
      <title>delayed traffic logging</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/delayed-traffic-logging/m-p/1002255#M5356</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some weird stuff going on on our unit: what are the chances that the firewall logged traffic that it received hours ago?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In our case, the firewall logged RDP connections that occurred in the early morning. However, the target servers didn't log any login attempts at all. The alleged source IP of the connections was down during that period(although we are not ruling out that some other device "borrowed" the source IP).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What i also found odd is that we would normally see RDP TCP connections...the log entries in question are RDP UDP, and had "aged-out" as Session End Reason.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it possible that somehow, those connections were initiated hours earlier, then somehow our firewall logged it as having occured in the early morning?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 02:15:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/delayed-traffic-logging/m-p/1002255#M5356</guid>
      <dc:creator>itassetbenilde</dc:creator>
      <dc:date>2025-01-10T02:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: delayed traffic logging</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/delayed-traffic-logging/m-p/1002315#M5357</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/283870"&gt;@itassetbenilde&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please verify the traffic log setting configuration, as logging is depends on security policy log setting configuration. Please refer the below kb for more details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clt5CAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clt5CAC&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 04:13:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/delayed-traffic-logging/m-p/1002315#M5357</guid>
      <dc:creator>mshekh</dc:creator>
      <dc:date>2025-01-10T04:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: delayed traffic logging</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/delayed-traffic-logging/m-p/1002684#M5363</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/283870"&gt;@itassetbenilde&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;RDP can utilize TCP or UDP, so what you're seeing isn't really abnormal. You can disable the ability to utilize UDP for RDP via Group Policy, in fact for performance reasons it's actually something that I recommend anyone using PAN and GlobalProtect do as I've found it provides the best performance.&lt;/P&gt;
&lt;P&gt;As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/195187"&gt;@mshekh&lt;/a&gt; mentioned, the first thing that you'll want to look at is the actual log file that was generated. The traffic logs by default filter on receive_time, however for RDP you really should be looking at the actual log details themselves and looking for the start time if you're trying to locate associated events on the other end. Rules by default will only have log-end enabled; what I generally recommend is that you enable log-start on RDP rules in addition to log-end so that you can easily see if a session is on-going without having to look at the session table.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2025 15:00:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/delayed-traffic-logging/m-p/1002684#M5363</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-01-10T15:00:06Z</dc:date>
    </item>
  </channel>
</rss>

