<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Receive errors on all traffic interfaces in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/receive-errors-on-all-traffic-interfaces/m-p/522319#M609</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/259029"&gt;@tulkas&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for posting in LIVEcommunity!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Could you confirm what devices are connected uplink and downlink to Firewall?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- My first suspect for non-IP traffic would be anything that arrives interface of Firewall, but Firewall does not understand it. For example CDP, DTP, VTP, PAGP. Have you seen any layer 2 traffic in the packet capture?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
    <pubDate>Thu, 24 Nov 2022 03:27:58 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2022-11-24T03:27:58Z</dc:date>
    <item>
      <title>Receive errors on all traffic interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/receive-errors-on-all-traffic-interfaces/m-p/522266#M605</link>
      <description>&lt;P&gt;Hi guys&lt;/P&gt;
&lt;P&gt;I am a bit lost in our own network...... We have a PA-820 Cluster in active-passive mode. It is running for maybe 7 months now. Each firewall has 2 uplinks to our 2 core switches and 1 downlink to the access switch (with subcontractor on it).&lt;/P&gt;
&lt;P&gt;We noticed around 2 weeks ago that all those 6 ports have hardware receive errors since we installed them. The downlink ports to the access area have a lot more (in around 1.5 weeks 292'359) then the uplinks the uplinks (around 9'000). The access area does not communicate that much to outside. The uplinks are singlemode fibre and the downlink normal RJ45. I changed the RJ45 already without any success. The SFPs are from Finisar 1G and should be supported although the firewall does not recognize them (there is no vendor name or vendor part number). However the hardware part shouldn't be the issue as we have the same situation in fibre &amp;amp; copper.&lt;/P&gt;
&lt;P&gt;I did some research and packet captures and initially thought its because of STP frames arriving on the port which count as errors. But after disabling it the counters still increase. So currently I have no non-ip traffic on those interfaces according to the PCAP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I found the following command which shows you recent counters and also drops:&lt;/P&gt;
&lt;P&gt;show counter global filter delta yes&lt;/P&gt;
&lt;P&gt;When using this command I see following drops: (also see attachment)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp; value rate severity category aspect description&lt;/P&gt;
&lt;P&gt;flow_rcv_dot1q_tag_err&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 23 &amp;nbsp; &amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop&amp;nbsp;&amp;nbsp;&amp;nbsp; flow&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; parse&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets dropped: 802.1q tag not configured&lt;BR /&gt;flow_no_interface &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 23&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; &amp;nbsp; drop&amp;nbsp;&amp;nbsp;&amp;nbsp; flow&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; parse&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; Packets dropped: invalid interface&lt;BR /&gt;flow_ipv6_disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 800&amp;nbsp;&amp;nbsp; 13&amp;nbsp;&amp;nbsp;&amp;nbsp; drop&amp;nbsp;&amp;nbsp;&amp;nbsp; flow &amp;nbsp; &amp;nbsp; &amp;nbsp; parse&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp; Packets dropped: IPv6 disabled on interface&lt;BR /&gt;flow_policy_deny&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1121&amp;nbsp; 19&amp;nbsp;&amp;nbsp;&amp;nbsp; drop&amp;nbsp;&amp;nbsp;&amp;nbsp; flow&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; session&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session setup: denied by policy&lt;BR /&gt;flow_fwd_l3_bcast_drop&amp;nbsp;&amp;nbsp;&amp;nbsp; 5677&amp;nbsp;&amp;nbsp; 98&amp;nbsp;&amp;nbsp;&amp;nbsp; drop &amp;nbsp; &amp;nbsp; flow&amp;nbsp; &amp;nbsp; &amp;nbsp; forward&amp;nbsp;&amp;nbsp; &amp;nbsp; Packets dropped: unhandled IP broadcast&lt;BR /&gt;flow_fwd_l3_mcast_drop&amp;nbsp;&amp;nbsp;&amp;nbsp; 775&amp;nbsp;&amp;nbsp; 13&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop &amp;nbsp; &amp;nbsp; flow &amp;nbsp; &amp;nbsp;&amp;nbsp; forward &amp;nbsp; &amp;nbsp; Packets dropped: no route for IP multicast&lt;BR /&gt;flow_fwd_l3_noroute&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow&amp;nbsp;&amp;nbsp; &amp;nbsp; forward&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets dropped: no route&lt;BR /&gt;flow_fwd_l3_noarp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow &amp;nbsp; &amp;nbsp;&amp;nbsp; forward&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets dropped: no ARP&lt;/P&gt;
&lt;P&gt;flow_host_service_deny&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 746&amp;nbsp;&amp;nbsp;&amp;nbsp; 12&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop &amp;nbsp; &amp;nbsp; flow&amp;nbsp; &amp;nbsp;&amp;nbsp; mgmt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Device management session denied&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone has an idea how I can continue to troubleshoot this?&lt;/P&gt;&lt;BR /&gt;&lt;BR /&gt;Please note you are posting a public message where community members and experts can provide assistance. Sharing private information such as serial numbers or company information is not recommended.</description>
      <pubDate>Wed, 23 Nov 2022 16:18:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/receive-errors-on-all-traffic-interfaces/m-p/522266#M605</guid>
      <dc:creator>tulkas</dc:creator>
      <dc:date>2022-11-23T16:18:30Z</dc:date>
    </item>
    <item>
      <title>Re: Receive errors on all traffic interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/receive-errors-on-all-traffic-interfaces/m-p/522285#M607</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/259029"&gt;@tulkas&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check out these support links:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWoCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWoCAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWkCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWkCAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 19:24:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/receive-errors-on-all-traffic-interfaces/m-p/522285#M607</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2022-11-23T19:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: Receive errors on all traffic interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/receive-errors-on-all-traffic-interfaces/m-p/522319#M609</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/259029"&gt;@tulkas&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for posting in LIVEcommunity!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Could you confirm what devices are connected uplink and downlink to Firewall?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- My first suspect for non-IP traffic would be anything that arrives interface of Firewall, but Firewall does not understand it. For example CDP, DTP, VTP, PAGP. Have you seen any layer 2 traffic in the packet capture?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 03:27:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/receive-errors-on-all-traffic-interfaces/m-p/522319#M609</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-11-24T03:27:58Z</dc:date>
    </item>
  </channel>
</rss>

