<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security policies not working in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/security-policies-not-working/m-p/1223451#M5672</link>
    <description>&lt;P&gt;Hi, Suresh,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks for your detailed help - while it didn't help I got to the solution at the end&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For some reason, when reading number 5., I got an idea from your number 1. where mentioning if it's actually passing through the firewall - and then it hit me! And I am not ashamed to admit that I am still learning PA and the networking so I haven't thought of the "intrazone" rule and scenario straight away. Both hosts were on the same subnet/zone. Hence the traffic was not traversing firewall if it didn't go out of the zone, and of course hitting the rules. So anything in the same zone was working all the time, while anything going one was hitting the correct rules - hence discrepency.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regardless, you gave me the idea and it's still kind of "accepted" solution, so thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;G&lt;/P&gt;</description>
    <pubDate>Tue, 11 Mar 2025 15:38:25 GMT</pubDate>
    <dc:creator>GregorJus</dc:creator>
    <dc:date>2025-03-11T15:38:25Z</dc:date>
    <item>
      <title>Security policies not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/security-policies-not-working/m-p/1223187#M5653</link>
      <description>&lt;P&gt;I've come across the most odd issue that I can't figure it out for the life of me. I am only hopping it's some silly "tick box" or something I have missed. Long story short...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have created a very simple top security rule with IP address as a source (any zone/user/device) towards any destination (any zone/application/service) and set it to deny. Sadly it doesn't work fully. Example below - how can that even be?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;web browsing is blocked&lt;/LI&gt;
&lt;LI&gt;ping is NOT blocked&lt;/LI&gt;
&lt;LI&gt;RDP (mstsc) is also NOT blocked&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Furthermore, looking at the traffic log there is no signs of any RDP traffic, pings, etc. Nothing is recognised.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any idea?&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 20:54:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/security-policies-not-working/m-p/1223187#M5653</guid>
      <dc:creator>GregorJus</dc:creator>
      <dc:date>2025-03-07T20:54:59Z</dc:date>
    </item>
    <item>
      <title>Re: Security policies not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/security-policies-not-working/m-p/1223279#M5656</link>
      <description>&lt;P&gt;Hi Can you share you policy config to look into it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However here the possible reasons for the issue.&lt;/P&gt;
&lt;P&gt;it sounds like your top security rule should be blocking all traffic from the specified source IP, but some traffic types (ICMP for ping, RDP) are still passing through.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 whitespace-normal break-words text-start [.text-message+&amp;amp;]:mt-5" dir="auto" data-message-author-role="assistant" data-message-id="a401fa63-181f-49bd-abc9-0329c3b4a4dc" data-message-model-slug="gpt-4o"&gt;
&lt;DIV class="flex w-full flex-col gap-1 empty:hidden first:pt-[3px]"&gt;
&lt;DIV class="markdown prose w-full break-words dark:prose-invert light"&gt;
&lt;P data-start="229" data-end="289"&gt;&lt;STRONG&gt;1. Ensure the Traffic is Routed Through the Firewall&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you don’t see any logs for RDP or ICMP traffic, the firewall might not be processing these packets.&lt;/P&gt;
&lt;P&gt;Verify that the traffic is actually passing through the firewall and not taking an alternate route (e.g., direct L2 switching or a different gateway).&lt;/P&gt;
&lt;P data-start="555" data-end="600"&gt;&lt;STRONG&gt;2. Check for Security Policy Matching&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Use the Test Security Policy Match tool in PAN-OS to see if the traffic is hitting the expected rule.&lt;/P&gt;
&lt;P&gt;If the traffic is not matching your deny rule, it might be getting permitted by another rule lower in the rulebase.&lt;/P&gt;
&lt;P data-start="834" data-end="867"&gt;&lt;STRONG&gt;3. ICMP and Ping Handling&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;By default, ICMP (ping) is often handled by a separate setting under Network &amp;gt; Network Profiles &amp;gt; Security Profiles &amp;gt; Zone Protection Profiles rather than the security policy.&lt;/P&gt;
&lt;P&gt;Ensure your Zone Protection Profile is configured to block ICMP if needed.&lt;/P&gt;
&lt;P data-start="1138" data-end="1193"&gt;&lt;STRONG&gt;4. Application Identification and Session Setup&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Some protocols like RDP (mstsc) might not be identified immediately in the first few packets.&lt;/P&gt;
&lt;P&gt;Ensure your rule is not limited to a specific application but instead set to "any" in the application field.&lt;/P&gt;
&lt;P&gt;If using application-based security policies, try switching to a service (port-based) rule instead.&lt;/P&gt;
&lt;P data-start="1521" data-end="1560"&gt;&lt;STRONG&gt;5. Check for Asymmetric Routing&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If the firewall sees only one side of the communication, it may not properly detect or log the traffic.&lt;/P&gt;
&lt;P&gt;Run Session Browser under Monitor &amp;gt; Session Browser to check if the sessions are established as expected.&lt;/P&gt;
&lt;P data-start="1790" data-end="1849"&gt;&lt;STRONG&gt;6. Security Rule Logging and Logging at Session End&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Ensure your deny rule has "Log at Session End" enabled so that all blocked attempts are visible in the traffic logs.&lt;/P&gt;
&lt;P data-start="1977" data-end="2118"&gt;Would you be able to provide a screenshot of your security rule or clarify if NAT is involved? That could help narrow down the issue further.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Sun, 09 Mar 2025 02:44:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/security-policies-not-working/m-p/1223279#M5656</guid>
      <dc:creator>Mudhireddy</dc:creator>
      <dc:date>2025-03-09T02:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: Security policies not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/security-policies-not-working/m-p/1223451#M5672</link>
      <description>&lt;P&gt;Hi, Suresh,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks for your detailed help - while it didn't help I got to the solution at the end&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For some reason, when reading number 5., I got an idea from your number 1. where mentioning if it's actually passing through the firewall - and then it hit me! And I am not ashamed to admit that I am still learning PA and the networking so I haven't thought of the "intrazone" rule and scenario straight away. Both hosts were on the same subnet/zone. Hence the traffic was not traversing firewall if it didn't go out of the zone, and of course hitting the rules. So anything in the same zone was working all the time, while anything going one was hitting the correct rules - hence discrepency.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regardless, you gave me the idea and it's still kind of "accepted" solution, so thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;G&lt;/P&gt;</description>
      <pubDate>Tue, 11 Mar 2025 15:38:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/security-policies-not-working/m-p/1223451#M5672</guid>
      <dc:creator>GregorJus</dc:creator>
      <dc:date>2025-03-11T15:38:25Z</dc:date>
    </item>
  </channel>
</rss>

