<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic High Data Plane Utilization During Business Hours in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/high-data-plane-utilization-during-business-hours/m-p/1242403#M6476</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are experiencing an issue that is becoming hard to isolate, our end users noticed network slowness about a few days ago.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;During Isolation and investigation it led us to our NGFW PA-3260's.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This causing extremely High latency when reaching out from our Inside to Internet interfaces.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="HungTrinh_0-1763749511805.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69899iBB78DBDE8CC70A90/image-size/medium?v=v2&amp;amp;px=400" role="button" title="HungTrinh_0-1763749511805.png" alt="HungTrinh_0-1763749511805.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Resource utilization (%) during last 24 hours:&lt;BR /&gt;session (average):&lt;BR /&gt;9 7 4 3 3 3 3 3 3 3 3 3 3 4 5 &lt;BR /&gt;5 7 10 11 11 11 11 11 11 &lt;BR /&gt;session (maximum):&lt;BR /&gt;10 9 6 4 5 3 3 3 4 4 4 4 4 5 5 &lt;BR /&gt;6 9 12 12 13 13 13 14 13 &lt;BR /&gt;packet buffer (average):&lt;BR /&gt;5 1 0 0 0 0 0 0 0 0 0 0 0 0 0 &lt;BR /&gt;0 0 3 10 17 17 16 24 34 &lt;BR /&gt;packet buffer (maximum):&lt;BR /&gt;60 22 3 3 1 1 1 1 1 1 1 1 1 3 2 &lt;BR /&gt;3 3 75 77 76 76 77 77 77 &lt;BR /&gt;packet descriptor (average):&lt;BR /&gt;0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 &lt;BR /&gt;0 0 0 0 0 0 0 0 0 &lt;BR /&gt;packet descriptor (maximum):&lt;BR /&gt;3 2 0 0 0 0 0 0 0 0 0 0 0 0 0 &lt;BR /&gt;0 0 1 1 2 2 2 1 1 &lt;BR /&gt;packet descriptor (on-chip) (average):&lt;BR /&gt;20 12 7 7 6 6 6 6 6 6 6 6 6 6 6 &lt;BR /&gt;6 7 11 18 19 20 20 24 31 &lt;BR /&gt;packet descriptor (on-chip) (maximum):&lt;BR /&gt;100 100 100 100 60 40 56 72 49 80 34 56 54 100 91 &lt;BR /&gt;100 99 100 100 100 100 100 100 100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a way to isolate this down better to mitigate what is causing the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- We have turned off SSL/TLS Decryption&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Our Session Count is no where near MAX&lt;/P&gt;
&lt;P&gt;- Out over bandwidth is 2Gbps, we see average of 400-500mbps with spikes up to 700mbps and more rare spikes to 1.25Gbps&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show session info&lt;/P&gt;
&lt;P&gt;target-dp: *.dp0&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Number of sessions supported: 2202007&lt;BR /&gt;Number of allocated sessions: 230274&lt;BR /&gt;Number of active TCP sessions: 51912&lt;BR /&gt;Number of active UDP sessions: 176844&lt;BR /&gt;Number of active ICMP sessions: 61&lt;BR /&gt;Number of active GTPc sessions: 0&lt;BR /&gt;Number of active HTTP2-5gc sessions: 0&lt;BR /&gt;Number of active GTPu sessions: 0&lt;BR /&gt;Number of pending GTPu sessions: 0&lt;BR /&gt;Number of active BCAST sessions: 0&lt;BR /&gt;Number of active MCAST sessions: 0&lt;BR /&gt;Number of active predict sessions: 41&lt;BR /&gt;Number of active SCTP sessions: 0&lt;BR /&gt;Number of active SCTP associations: 0&lt;BR /&gt;Number of active PFCP sessions: 0&lt;BR /&gt;Number of active IMSI sessions: 0&lt;BR /&gt;Session table utilization: 10%&lt;BR /&gt;Number of sessions created since bootup: 135467641&lt;BR /&gt;Packet rate: 112327/s&lt;BR /&gt;Throughput: 624559 kbps&lt;BR /&gt;New connection establish rate: 1047 cps&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Session timeout&lt;BR /&gt;TCP default timeout: 3600 secs&lt;BR /&gt;TCP session timeout before SYN-ACK received: 5 secs&lt;BR /&gt;TCP session timeout before 3-way handshaking: 10 secs&lt;BR /&gt;TCP half-closed session timeout: 120 secs&lt;BR /&gt;TCP session timeout in TIME_WAIT: 15 secs&lt;BR /&gt;TCP session delayed ack timeout: 25 millisecs&lt;BR /&gt;TCP session timeout for unverified RST: 30 secs&lt;BR /&gt;UDP default timeout: 30 secs&lt;BR /&gt;ICMP default timeout: 6 secs&lt;BR /&gt;SCTP default timeout: 3600 secs&lt;BR /&gt;SCTP timeout before INIT-ACK received: 5 secs&lt;BR /&gt;SCTP timeout before COOKIE received: 60 secs&lt;BR /&gt;SCTP timeout before SHUTDOWN received: 30 secs&lt;BR /&gt;5GC delete timeout: 15 secs&lt;BR /&gt;other IP default timeout: 30 secs&lt;BR /&gt;Captive Portal session timeout: 30 secs&lt;BR /&gt;Session timeout in discard state:&lt;BR /&gt;TCP: 90 secs, UDP: 60 secs, SCTP: 60 secs, other IP protocols: 60 secs&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Session accelerated aging: True&lt;BR /&gt;Accelerated aging threshold: 80% of utilization&lt;BR /&gt;Scaling factor: 2 X&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Session setup&lt;BR /&gt;TCP - reject non-SYN first packet: True&lt;BR /&gt;Hardware session offloading: True&lt;BR /&gt;Software Cut Through: False&lt;BR /&gt;Run-to-completion mode: False&lt;BR /&gt;Tunnel acceleration: True&lt;BR /&gt;IPv6 firewalling: True&lt;BR /&gt;Strict TCP/IP checksum: True&lt;BR /&gt;Strict TCP RST sequence: True&lt;BR /&gt;Reject TCP small initial window: False&lt;BR /&gt;Reject TCP SYN with different seq/options: True&lt;BR /&gt;Teardown session if forward zone changes: False&lt;BR /&gt;ICMP Unreachable Packet Rate: 200 pps&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Application trickling scan parameters:&lt;BR /&gt;Timeout to determine application trickling: 10 secs&lt;BR /&gt;Resource utilization threshold to start scan: 80%&lt;BR /&gt;Scan scaling factor over regular aging: 8&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Session behavior when resource limit is reached: drop&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Pcap token bucket rate : 10485760&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Max pending queued mcast packets per session : 0&lt;BR /&gt;--------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show running resource-monitor ingress-backlogs&lt;/P&gt;
&lt;P&gt;Fri Nov 21 10:35:00 2025&lt;/P&gt;
&lt;P&gt;-- SLOT: s1, DP: dp0 --&lt;BR /&gt;USAGE - ATOMIC: 17.87109375% TOTAL: 94.140625%&lt;/P&gt;
&lt;P&gt;TOP SESSIONS:&lt;BR /&gt;SESS-ID PCT GRP-ID COUNT Special Notes &lt;BR /&gt;651048 12% flow_fastpath 132&lt;BR /&gt;300786 2% flow_fastpath 23&lt;/P&gt;
&lt;P&gt;SESSION DETAILS&lt;BR /&gt;SESS-ID PROTO SZONE SRC SPORT DST DPORT IGR-IF EGR-IF TYPE APP&lt;BR /&gt;300786 6 GP_VPN 10.185.72.224 62896 141.185.3.200 1433 tunnel.1 ethernet1/13.242 FLOW mssql-db-unencrypted&lt;BR /&gt;651048 6 inside 10.185.34.152 62682 199.232.214.172 80 ethernet1/13.242 ethernet1/24.1000 FLOW ms-update&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show system resources&lt;/P&gt;
&lt;P&gt;top - 11:35:40 up 1 day, 19:01, 1 user, load average: 1.15, 1.04, 0.74&lt;BR /&gt;Tasks: 246 total, 1 running, 245 sleeping, 0 stopped, 0 zombie&lt;BR /&gt;%Cpu(s): 2.2 us, 1.5 sy, 0.0 ni, 94.8 id, 0.0 wa, 0.7 hi, 0.7 si, 0.0 st&lt;BR /&gt;MiB Mem : 15709.9 total, 271.7 free, 5597.4 used, 9840.9 buff/cache&lt;BR /&gt;MiB Swap: 7.8 total, 0.0 free, 7.8 used. 10939.8 avail Mem&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Model PA-3260&lt;BR /&gt;Serial # REDACTED&lt;BR /&gt;Software Version 11.1.10-h4&lt;BR /&gt;GlobalProtect Agent 6.2.8-c263&lt;BR /&gt;Application Version 9041-9768 (11/18/25)&lt;BR /&gt;Threat Version 9041-9768 (11/18/25)&lt;BR /&gt;Antivirus Version 5378-5904 (11/21/25)&lt;BR /&gt;Device Dictionary Version 201-666 (11/17/25)&lt;BR /&gt;WildFire Version 1032891-1037129 (11/21/25)&lt;BR /&gt;URL Filtering Version 20251121.20276&lt;BR /&gt;GlobalProtect Clientless VPN Version 98-260 (05/22/23)&lt;BR /&gt;Time Fri Nov 21 10:22:11 2025&lt;BR /&gt;Uptime 1 days, 17:48:18&lt;BR /&gt;Advanced Routing off&lt;BR /&gt;Duplicate IP Disabled&lt;BR /&gt;Plugin DLP dlp-5.0.0&lt;BR /&gt;Device Certificate Status Valid&lt;/P&gt;</description>
    <pubDate>Fri, 21 Nov 2025 19:36:29 GMT</pubDate>
    <dc:creator>HungTrinh</dc:creator>
    <dc:date>2025-11-21T19:36:29Z</dc:date>
    <item>
      <title>High Data Plane Utilization During Business Hours</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/high-data-plane-utilization-during-business-hours/m-p/1242403#M6476</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are experiencing an issue that is becoming hard to isolate, our end users noticed network slowness about a few days ago.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;During Isolation and investigation it led us to our NGFW PA-3260's.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This causing extremely High latency when reaching out from our Inside to Internet interfaces.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="HungTrinh_0-1763749511805.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69899iBB78DBDE8CC70A90/image-size/medium?v=v2&amp;amp;px=400" role="button" title="HungTrinh_0-1763749511805.png" alt="HungTrinh_0-1763749511805.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Resource utilization (%) during last 24 hours:&lt;BR /&gt;session (average):&lt;BR /&gt;9 7 4 3 3 3 3 3 3 3 3 3 3 4 5 &lt;BR /&gt;5 7 10 11 11 11 11 11 11 &lt;BR /&gt;session (maximum):&lt;BR /&gt;10 9 6 4 5 3 3 3 4 4 4 4 4 5 5 &lt;BR /&gt;6 9 12 12 13 13 13 14 13 &lt;BR /&gt;packet buffer (average):&lt;BR /&gt;5 1 0 0 0 0 0 0 0 0 0 0 0 0 0 &lt;BR /&gt;0 0 3 10 17 17 16 24 34 &lt;BR /&gt;packet buffer (maximum):&lt;BR /&gt;60 22 3 3 1 1 1 1 1 1 1 1 1 3 2 &lt;BR /&gt;3 3 75 77 76 76 77 77 77 &lt;BR /&gt;packet descriptor (average):&lt;BR /&gt;0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 &lt;BR /&gt;0 0 0 0 0 0 0 0 0 &lt;BR /&gt;packet descriptor (maximum):&lt;BR /&gt;3 2 0 0 0 0 0 0 0 0 0 0 0 0 0 &lt;BR /&gt;0 0 1 1 2 2 2 1 1 &lt;BR /&gt;packet descriptor (on-chip) (average):&lt;BR /&gt;20 12 7 7 6 6 6 6 6 6 6 6 6 6 6 &lt;BR /&gt;6 7 11 18 19 20 20 24 31 &lt;BR /&gt;packet descriptor (on-chip) (maximum):&lt;BR /&gt;100 100 100 100 60 40 56 72 49 80 34 56 54 100 91 &lt;BR /&gt;100 99 100 100 100 100 100 100 100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a way to isolate this down better to mitigate what is causing the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- We have turned off SSL/TLS Decryption&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Our Session Count is no where near MAX&lt;/P&gt;
&lt;P&gt;- Out over bandwidth is 2Gbps, we see average of 400-500mbps with spikes up to 700mbps and more rare spikes to 1.25Gbps&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show session info&lt;/P&gt;
&lt;P&gt;target-dp: *.dp0&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Number of sessions supported: 2202007&lt;BR /&gt;Number of allocated sessions: 230274&lt;BR /&gt;Number of active TCP sessions: 51912&lt;BR /&gt;Number of active UDP sessions: 176844&lt;BR /&gt;Number of active ICMP sessions: 61&lt;BR /&gt;Number of active GTPc sessions: 0&lt;BR /&gt;Number of active HTTP2-5gc sessions: 0&lt;BR /&gt;Number of active GTPu sessions: 0&lt;BR /&gt;Number of pending GTPu sessions: 0&lt;BR /&gt;Number of active BCAST sessions: 0&lt;BR /&gt;Number of active MCAST sessions: 0&lt;BR /&gt;Number of active predict sessions: 41&lt;BR /&gt;Number of active SCTP sessions: 0&lt;BR /&gt;Number of active SCTP associations: 0&lt;BR /&gt;Number of active PFCP sessions: 0&lt;BR /&gt;Number of active IMSI sessions: 0&lt;BR /&gt;Session table utilization: 10%&lt;BR /&gt;Number of sessions created since bootup: 135467641&lt;BR /&gt;Packet rate: 112327/s&lt;BR /&gt;Throughput: 624559 kbps&lt;BR /&gt;New connection establish rate: 1047 cps&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Session timeout&lt;BR /&gt;TCP default timeout: 3600 secs&lt;BR /&gt;TCP session timeout before SYN-ACK received: 5 secs&lt;BR /&gt;TCP session timeout before 3-way handshaking: 10 secs&lt;BR /&gt;TCP half-closed session timeout: 120 secs&lt;BR /&gt;TCP session timeout in TIME_WAIT: 15 secs&lt;BR /&gt;TCP session delayed ack timeout: 25 millisecs&lt;BR /&gt;TCP session timeout for unverified RST: 30 secs&lt;BR /&gt;UDP default timeout: 30 secs&lt;BR /&gt;ICMP default timeout: 6 secs&lt;BR /&gt;SCTP default timeout: 3600 secs&lt;BR /&gt;SCTP timeout before INIT-ACK received: 5 secs&lt;BR /&gt;SCTP timeout before COOKIE received: 60 secs&lt;BR /&gt;SCTP timeout before SHUTDOWN received: 30 secs&lt;BR /&gt;5GC delete timeout: 15 secs&lt;BR /&gt;other IP default timeout: 30 secs&lt;BR /&gt;Captive Portal session timeout: 30 secs&lt;BR /&gt;Session timeout in discard state:&lt;BR /&gt;TCP: 90 secs, UDP: 60 secs, SCTP: 60 secs, other IP protocols: 60 secs&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Session accelerated aging: True&lt;BR /&gt;Accelerated aging threshold: 80% of utilization&lt;BR /&gt;Scaling factor: 2 X&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Session setup&lt;BR /&gt;TCP - reject non-SYN first packet: True&lt;BR /&gt;Hardware session offloading: True&lt;BR /&gt;Software Cut Through: False&lt;BR /&gt;Run-to-completion mode: False&lt;BR /&gt;Tunnel acceleration: True&lt;BR /&gt;IPv6 firewalling: True&lt;BR /&gt;Strict TCP/IP checksum: True&lt;BR /&gt;Strict TCP RST sequence: True&lt;BR /&gt;Reject TCP small initial window: False&lt;BR /&gt;Reject TCP SYN with different seq/options: True&lt;BR /&gt;Teardown session if forward zone changes: False&lt;BR /&gt;ICMP Unreachable Packet Rate: 200 pps&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Application trickling scan parameters:&lt;BR /&gt;Timeout to determine application trickling: 10 secs&lt;BR /&gt;Resource utilization threshold to start scan: 80%&lt;BR /&gt;Scan scaling factor over regular aging: 8&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Session behavior when resource limit is reached: drop&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Pcap token bucket rate : 10485760&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;Max pending queued mcast packets per session : 0&lt;BR /&gt;--------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show running resource-monitor ingress-backlogs&lt;/P&gt;
&lt;P&gt;Fri Nov 21 10:35:00 2025&lt;/P&gt;
&lt;P&gt;-- SLOT: s1, DP: dp0 --&lt;BR /&gt;USAGE - ATOMIC: 17.87109375% TOTAL: 94.140625%&lt;/P&gt;
&lt;P&gt;TOP SESSIONS:&lt;BR /&gt;SESS-ID PCT GRP-ID COUNT Special Notes &lt;BR /&gt;651048 12% flow_fastpath 132&lt;BR /&gt;300786 2% flow_fastpath 23&lt;/P&gt;
&lt;P&gt;SESSION DETAILS&lt;BR /&gt;SESS-ID PROTO SZONE SRC SPORT DST DPORT IGR-IF EGR-IF TYPE APP&lt;BR /&gt;300786 6 GP_VPN 10.185.72.224 62896 141.185.3.200 1433 tunnel.1 ethernet1/13.242 FLOW mssql-db-unencrypted&lt;BR /&gt;651048 6 inside 10.185.34.152 62682 199.232.214.172 80 ethernet1/13.242 ethernet1/24.1000 FLOW ms-update&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show system resources&lt;/P&gt;
&lt;P&gt;top - 11:35:40 up 1 day, 19:01, 1 user, load average: 1.15, 1.04, 0.74&lt;BR /&gt;Tasks: 246 total, 1 running, 245 sleeping, 0 stopped, 0 zombie&lt;BR /&gt;%Cpu(s): 2.2 us, 1.5 sy, 0.0 ni, 94.8 id, 0.0 wa, 0.7 hi, 0.7 si, 0.0 st&lt;BR /&gt;MiB Mem : 15709.9 total, 271.7 free, 5597.4 used, 9840.9 buff/cache&lt;BR /&gt;MiB Swap: 7.8 total, 0.0 free, 7.8 used. 10939.8 avail Mem&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Model PA-3260&lt;BR /&gt;Serial # REDACTED&lt;BR /&gt;Software Version 11.1.10-h4&lt;BR /&gt;GlobalProtect Agent 6.2.8-c263&lt;BR /&gt;Application Version 9041-9768 (11/18/25)&lt;BR /&gt;Threat Version 9041-9768 (11/18/25)&lt;BR /&gt;Antivirus Version 5378-5904 (11/21/25)&lt;BR /&gt;Device Dictionary Version 201-666 (11/17/25)&lt;BR /&gt;WildFire Version 1032891-1037129 (11/21/25)&lt;BR /&gt;URL Filtering Version 20251121.20276&lt;BR /&gt;GlobalProtect Clientless VPN Version 98-260 (05/22/23)&lt;BR /&gt;Time Fri Nov 21 10:22:11 2025&lt;BR /&gt;Uptime 1 days, 17:48:18&lt;BR /&gt;Advanced Routing off&lt;BR /&gt;Duplicate IP Disabled&lt;BR /&gt;Plugin DLP dlp-5.0.0&lt;BR /&gt;Device Certificate Status Valid&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2025 19:36:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/high-data-plane-utilization-during-business-hours/m-p/1242403#M6476</guid>
      <dc:creator>HungTrinh</dc:creator>
      <dc:date>2025-11-21T19:36:29Z</dc:date>
    </item>
    <item>
      <title>Re: High Data Plane Utilization During Business Hours</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/high-data-plane-utilization-during-business-hours/m-p/1242414#M6477</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/203995"&gt;@HungTrinh&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you seen this document -&amp;gt;&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRTCA0&amp;amp;lang=en_US" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRTCA0&amp;amp;lang=en_US&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Sun, 23 Nov 2025 00:23:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/high-data-plane-utilization-during-business-hours/m-p/1242414#M6477</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-11-23T00:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: High Data Plane Utilization During Business Hours</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/high-data-plane-utilization-during-business-hours/m-p/1244481#M6547</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Have you found the solution ? Because it's seems to be related to packet descriptors : you can try this command.&lt;EM&gt;show running resource-monitor ingress-backlogs&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000oNeOCAU" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000oNeOCAU&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Dec 2025 15:51:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/high-data-plane-utilization-during-business-hours/m-p/1244481#M6547</guid>
      <dc:creator>RomainSalmon</dc:creator>
      <dc:date>2025-12-23T15:51:58Z</dc:date>
    </item>
  </channel>
</rss>

