<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: The same traffic is getting allowed by one rule and blocked in firewall by another (please refer scrnshot) in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-same-traffic-is-getting-allowed-by-one-rule-and-blocked-in/m-p/1229450#M5907</link>
    <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JubairJunaid_0-1747658545686.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67684iA2FA6A6E458A3147/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JubairJunaid_0-1747658545686.png" alt="JubairJunaid_0-1747658545686.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 19 May 2025 12:42:32 GMT</pubDate>
    <dc:creator>JubairJunaid</dc:creator>
    <dc:date>2025-05-19T12:42:32Z</dc:date>
    <item>
      <title>The same traffic is getting allowed by one rule and blocked in firewall by another (please refer scrnshot)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-same-traffic-is-getting-allowed-by-one-rule-and-blocked-in/m-p/1229448#M5906</link>
      <description>&lt;P&gt;So we have a explicit Deny all rule at the bottom most, and there is another rule by which the same traffic is also getting allowed.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;The allowed rule has dest as any and has URL category in it with service as https.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So if u can see the screenshot same traffic is getting blocked by bottom most Deny ALL and allowed by the &amp;lt;Int prod to lambda URL&amp;gt; rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Only difference is the Action source, for denied traffic it is "from application" and for allowed traffic "from-policy"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kindly let me know why the same traffic is getting allowed by 1 rule and blocked by other.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 May 2025 12:41:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-same-traffic-is-getting-allowed-by-one-rule-and-blocked-in/m-p/1229448#M5906</guid>
      <dc:creator>JubairJunaid</dc:creator>
      <dc:date>2025-05-19T12:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: The same traffic is getting allowed by one rule and blocked in firewall by another (please refer scrnshot)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-same-traffic-is-getting-allowed-by-one-rule-and-blocked-in/m-p/1229450#M5907</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JubairJunaid_0-1747658545686.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67684iA2FA6A6E458A3147/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JubairJunaid_0-1747658545686.png" alt="JubairJunaid_0-1747658545686.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 May 2025 12:42:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-same-traffic-is-getting-allowed-by-one-rule-and-blocked-in/m-p/1229450#M5907</guid>
      <dc:creator>JubairJunaid</dc:creator>
      <dc:date>2025-05-19T12:42:32Z</dc:date>
    </item>
    <item>
      <title>Re: The same traffic is getting allowed by one rule and blocked in firewall by another (please refer scrnshot)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-same-traffic-is-getting-allowed-by-one-rule-and-blocked-in/m-p/1229456#M5908</link>
      <description>&lt;P&gt;You are logging session beginning and end.&lt;/P&gt;
&lt;P&gt;First firewall needs to let through TCP 3way handshake.&lt;/P&gt;
&lt;P&gt;After that it identifies real application and if that application is not in the policy then Palo starts looking for following rules below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Usually you want to enable logging at session beginning only during troubleshooting sessions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1747675288685.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67685i31AD11CEAAD919A4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1747675288685.png" alt="Raido_Rattameister_0-1747675288685.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 May 2025 17:21:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-same-traffic-is-getting-allowed-by-one-rule-and-blocked-in/m-p/1229456#M5908</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-05-19T17:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: The same traffic is getting allowed by one rule and blocked in firewall by another (please refer scrnshot)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-same-traffic-is-getting-allowed-by-one-rule-and-blocked-in/m-p/1229604#M5914</link>
      <description>&lt;P&gt;Thanks, I will try that, but will it resolve the issue or just give me the correct logs ?&lt;BR /&gt;Wont enabling Log at session start cause more load to cpu for the explicit Deny rule.&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 09:09:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-same-traffic-is-getting-allowed-by-one-rule-and-blocked-in/m-p/1229604#M5914</guid>
      <dc:creator>JubairJunaid</dc:creator>
      <dc:date>2025-05-21T09:09:23Z</dc:date>
    </item>
    <item>
      <title>Re: The same traffic is getting allowed by one rule and blocked in firewall by another (please refer scrnshot)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-same-traffic-is-getting-allowed-by-one-rule-and-blocked-in/m-p/1229621#M5916</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;Thanks, I will try that, but will it resolve the issue or just give me the correct logs ?"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In initial post you mentioned that rule that permits traffic has URL category in it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thing is that Palo can't identify URL category based on first packet.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Assuming that traffic is pure HTTP then Palo can identify application based on 5th packet (in case of HTTPS URL is retrieved from SNI on the cert).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;SYN (client to server)&lt;BR /&gt;SYN ACK (server to client)&lt;BR /&gt;ACK&amp;nbsp;(client to server)&lt;BR /&gt;HTTP GET&amp;nbsp;(client to server)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;WEBSITE DATA BACK TO THE CLIENT &amp;lt;&amp;lt;&amp;lt; this is where Palo identifies traffic as web-browsing.&amp;nbsp;(server to client)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So initial 4 packets need to be permitted through by some rule and in your case you see it in logs because you have log at session start checked.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you don't want initial TCP 3way handshake to match some random rule you can add before any outgoing rule this nonsense rule that in reality would never permit pings (because ping is ICMP protocol) but it would log all TCP 3way handshakes under single rule name so you can run reports against it etc as needed.&lt;/P&gt;
&lt;P&gt;Adjust it according to your needs as it is very broad permitting outgoing SYN sent on any port (you might want to limit it to 80 and 443).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1747831647909.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/67701iFE26BA622CB001E9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1747831647909.png" alt="Raido_Rattameister_0-1747831647909.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"&lt;SPAN&gt;Wont enabling Log at session start cause more load to cpu for the explicit Deny rule."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You already have log at session start checked. You need to uncheck it to see logs&amp;nbsp; correctly.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I assume it based on session end reason being "n/a" for those logs.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 12:54:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-same-traffic-is-getting-allowed-by-one-rule-and-blocked-in/m-p/1229621#M5916</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-05-21T12:54:20Z</dc:date>
    </item>
  </channel>
</rss>

