<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NGFW Blocking Router Login Traffic After Policy Update – Requesting Guidance in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-blocking-router-login-traffic-after-policy-update/m-p/1230927#M5957</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1658430139"&gt;@MaryBrown&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for info, you can try using the packet capture with specific filter and verify the global counters to see if there is a packet drop at firewall. Based on the counters you can troubleshoot further.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Jun 2025 08:04:24 GMT</pubDate>
    <dc:creator>mshekh</dc:creator>
    <dc:date>2025-06-04T08:04:24Z</dc:date>
    <item>
      <title>NGFW Blocking Router Login Traffic After Policy Update – Requesting Guidance</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-blocking-router-login-traffic-after-policy-update/m-p/1230870#M5952</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;I’m reaching out for help with an issue I’m facing on my Palo Alto Next-Generation Firewall involving router login and network access control.&lt;/P&gt;&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Issue:&lt;/STRONG&gt;&lt;BR /&gt;After updating security policies to improve our network posture, I'm noticing that&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://routerlogin.us" target="_self"&gt;router login&amp;nbsp;&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;attempts (to internal and remote routers) are being blocked or timing out. These router connections were accessible before the policy changes. I’ve checked the logs and policy configurations but can’t determine what’s causing the problem.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Environment Details:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Model: PA-3220&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;PAN-OS Version: 10.2.x&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Deployment Mode: Layer 3&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Zones: Trust / Untrust&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Services Involved: HTTPS, SSH (used for router login)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Devices Affected: Multiple internal routers (Cisco, Netgear)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;What I’ve Done So Far:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Reviewed and reordered security policies&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Verified that NAT rules haven’t changed&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Checked traffic logs under Monitor &amp;gt; Traffic&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Ran packet captures — sessions are initiated but drop after SYN&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Tested access to router login pages from alternate zones — same issue&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;My Questions:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;How can I accurately identify which policy is dropping the router login traffic?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Could the firewall's threat prevention or App-ID be interfering with router access?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Are there advanced diagnostic tools in PAN-OS I should use to trace this issue?&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Any insights, especially from those who’ve handled similar router access issues, would be greatly appreciated. Let me know if I should provide config snippets or specific log entries.&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;BR /&gt;Marry Brown&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 11:14:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-blocking-router-login-traffic-after-policy-update/m-p/1230870#M5952</guid>
      <dc:creator>MaryBrown</dc:creator>
      <dc:date>2025-06-03T11:14:44Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW Blocking Router Login Traffic After Policy Update – Requesting Guidance</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-blocking-router-login-traffic-after-policy-update/m-p/1230927#M5957</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1658430139"&gt;@MaryBrown&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for info, you can try using the packet capture with specific filter and verify the global counters to see if there is a packet drop at firewall. Based on the counters you can troubleshoot further.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 08:04:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-blocking-router-login-traffic-after-policy-update/m-p/1230927#M5957</guid>
      <dc:creator>mshekh</dc:creator>
      <dc:date>2025-06-04T08:04:24Z</dc:date>
    </item>
  </channel>
</rss>

