<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to Ping Palo Alto Interface – Connectivity Appears One-Sided in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/unable-to-ping-palo-alto-interface-connectivity-appears-one/m-p/1238063#M6297</link>
    <description>&lt;P&gt;&lt;SPAN&gt;we checked and didn''t create any custom "deny all" rule placed above the default intrazone-default rule&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 16 Sep 2025 11:24:39 GMT</pubDate>
    <dc:creator>jahidur27</dc:creator>
    <dc:date>2025-09-16T11:24:39Z</dc:date>
    <item>
      <title>Unable to Ping Palo Alto Interface – Connectivity Appears One-Sided</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/unable-to-ping-palo-alto-interface-connectivity-appears-one/m-p/1238029#M6294</link>
      <description>&lt;P&gt;We are working with a client who has a network setup where a Palo Alto firewall is connected to a Check Point firewall. The client reports that they are unable to ping the IP address of the Palo Alto firewall's interface ethernet1/8.&lt;/P&gt;&lt;H3&gt;Troubleshooting Steps Performed:&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Initial Test Between Firewalls:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;The Palo Alto firewall is connected to the Check Point firewall via interface ethernet1/8 (on Palo Alto) to ethernet1/13 (on Check Point).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;We are unable to ping the Palo Alto interface IP (ethernet1/8) from the Check Point firewall.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;However, traffic is confirmed to be flowing through this interface (via monitoring/logs), indicating Layer 2/3 connectivity is at least partially functional.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Direct Laptop Connection for Testing:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;A laptop was connected directly to the Palo Alto ethernet1/8 interface and configured with an IP in the same subnet.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The laptop was &lt;STRONG&gt;unable to ping&lt;/STRONG&gt; the interface IP of ethernet1/8.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Check Point Verification:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;The same laptop was then connected to the Check Point interface ethernet1/13 and could successfully ping the Check Point firewall IP, confirming the laptop’s configuration and connectivity are fine.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;This suggests the issue lies with the Palo Alto firewall interface, not the cabling or endpoint.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Testing with Alternate Interface:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;We assigned a new subnet to a different Palo Alto interface (ethernet1/5) and connected the laptop directly.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The result was the same – the interface was &lt;STRONG&gt;not responding to pings&lt;/STRONG&gt;, despite being up and assigned a valid IP.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;H3&gt;Additional Information:&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Ping response (Management Profile)&lt;/STRONG&gt; is enabled on both interfaces (ethernet1/8 and ethernet1/5) as confirmed in the Palo Alto configuration.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Physical interfaces are &lt;STRONG&gt;up&lt;/STRONG&gt;, and traffic is observed as passing on ethernet1/8 toward the Check Point firewall.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The issue is &lt;STRONG&gt;not related to routing&lt;/STRONG&gt;, as the laptop is in the same subnet and connected directly.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Suspicion:&lt;/H3&gt;&lt;P&gt;We suspect there may be additional, unreported configuration changes made by the client (possibly security rules or zones affecting ICMP traffic) which are impacting the expected behavior. However, we currently do not have visibility into the full policy or security rulebase applied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone encountered a similar issue where Palo Alto interfaces are up and passing traffic but do not respond to pings even with ping enabled?&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Any suggestions on commands or logs we can check (e.g., debug, flow basic, etc.) to help isolate this issue further?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;zhd&lt;/P&gt;</description>
      <pubDate>Tue, 16 Sep 2025 04:06:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/unable-to-ping-palo-alto-interface-connectivity-appears-one/m-p/1238029#M6294</guid>
      <dc:creator>jahidur27</dc:creator>
      <dc:date>2025-09-16T04:06:33Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Ping Palo Alto Interface – Connectivity Appears One-Sided</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/unable-to-ping-palo-alto-interface-connectivity-appears-one/m-p/1238054#M6295</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/922237585"&gt;@jahidur27&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is ping allowed by security policy ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The default security policy allows all traffic within the same zone (intrazone-default rule) but drops all traffic between different zones (interzone-default rule). Therefore, a ping from a directly connected laptop to a firewall interface should be allowed by default.&lt;/P&gt;
&lt;P&gt;However, this access will be blocked if you have a custom "deny all" rule placed above the default intrazone-default rule. This more restrictive posture ensures only explicitly permitted intra-zone traffic can flow, but it also renders the default rule ineffective.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Sep 2025 09:41:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/unable-to-ping-palo-alto-interface-connectivity-appears-one/m-p/1238054#M6295</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2025-09-16T09:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Ping Palo Alto Interface – Connectivity Appears One-Sided</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/unable-to-ping-palo-alto-interface-connectivity-appears-one/m-p/1238062#M6296</link>
      <description>&lt;P&gt;we checked that we didn''t create any&amp;nbsp;&lt;SPAN&gt;custom "deny all" rule placed above the default intrazone-default rule.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Sep 2025 11:23:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/unable-to-ping-palo-alto-interface-connectivity-appears-one/m-p/1238062#M6296</guid>
      <dc:creator>jahidur27</dc:creator>
      <dc:date>2025-09-16T11:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Ping Palo Alto Interface – Connectivity Appears One-Sided</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/unable-to-ping-palo-alto-interface-connectivity-appears-one/m-p/1238063#M6297</link>
      <description>&lt;P&gt;&lt;SPAN&gt;we checked and didn''t create any custom "deny all" rule placed above the default intrazone-default rule&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Sep 2025 11:24:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/unable-to-ping-palo-alto-interface-connectivity-appears-one/m-p/1238063#M6297</guid>
      <dc:creator>jahidur27</dc:creator>
      <dc:date>2025-09-16T11:24:39Z</dc:date>
    </item>
  </channel>
</rss>

