<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Complete application traffic report for firewall rule in Panorama Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527927#M1331</link>
    <description>&lt;P&gt;Yepp that's what we tried to do, but it's just to many sessions.&lt;/P&gt;
&lt;P&gt;With the default setting of 65000 rows in CSV, gives us 1.5 hours of traffic and we want to see like a months traffic.&lt;/P&gt;
&lt;P&gt;So if we changed it to the max value of&amp;nbsp;&lt;SPAN&gt;1048576 rows in CSV, would give us approx. 1.5 days.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Can't see that there is a way to sort out all the duplicate sessions in the monitor view.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 20 Jan 2023 09:08:14 GMT</pubDate>
    <dc:creator>JohnHogman</dc:creator>
    <dc:date>2023-01-20T09:08:14Z</dc:date>
    <item>
      <title>Complete application traffic report for firewall rule</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/526936#M1316</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have migrated our customers old firewalls to Palo altos and managing them through Panorama.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now we want to convert the old rules into specific application rules. From server to server , Application by application.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So what I need is a complete traffic log/report, rule by rule to be able to start with the new Application rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It seems that all the reports and CSV exports are caped to a specifik amount of entries? Which makes the report incomplete.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The things I've tried is custom reports with the rule as filter, and doing csv exports from the regular traffic monitor.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I would like to have is a complete report of say 30days on all unique Application traffic that hits a specific rule.&lt;/P&gt;
&lt;P&gt;By unique I mean that I don't need duplicate entries from and to the same servers with the same application, It would be nice to just have it summarized.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this possible? Seems the amount of sessions is the problem now, to get a complete report.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2023 10:10:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/526936#M1316</guid>
      <dc:creator>JohnHogman</dc:creator>
      <dc:date>2023-01-13T10:10:53Z</dc:date>
    </item>
    <item>
      <title>Re: Complete application traffic report for firewall rule</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/526996#M1317</link>
      <description>&lt;P&gt;Dont need to do that! Thankfully palo alto has already a tool INTEGRATED into the firewall, you can see it at the left bottom corner its called policy optimizer, which does exactly that what you are asking for, but without running trough so many hops,&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/security-policy-rule-optimization/migrate-port-based-to-app-id-based-security-policy-rules" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/security-policy-rule-optimization/migrate-port-based-to-app-id-based-security-policy-rules&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also i would suggest you to read and watch some tutorials on the expedition tool, which helps your migrations from old FW to NGFW from palo alto networks,&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/products/secure-the-network/next-generation-firewall/migration-tool" target="_blank"&gt;https://www.paloaltonetworks.com/products/secure-the-network/next-generation-firewall/migration-tool&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I hope this information suits you well!&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2023 18:51:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/526996#M1317</guid>
      <dc:creator>GabrielMontiel</dc:creator>
      <dc:date>2023-01-13T18:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: Complete application traffic report for firewall rule</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527150#M1318</link>
      <description>&lt;P&gt;I've looked into the optimizer before.&lt;/P&gt;
&lt;P&gt;My understanding is that it's great if you have portbased rule from before, to convert them into application based rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But in my case it's&amp;nbsp; an any to any rule, so I guess the optimizer would make it any to any on specific applications?&lt;/P&gt;
&lt;P&gt;What I want to do is to from server to server on specific application.&lt;/P&gt;
&lt;P&gt;Is it possible in the optimizer?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jan 2023 08:50:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527150#M1318</guid>
      <dc:creator>JohnHogman</dc:creator>
      <dc:date>2023-01-16T08:50:07Z</dc:date>
    </item>
    <item>
      <title>Re: Complete application traffic report for firewall rule</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527220#M1320</link>
      <description>I understood your use case, yes policy optimizer is mostly to use&lt;BR /&gt;applications in policies.&lt;BR /&gt;&lt;BR /&gt;If you want to "close" the policy to some src and dst addresses it would be&lt;BR /&gt;easier for you to create a custom report filtering with the policy name, or&lt;BR /&gt;simply in the ACC filter to policy name, also you could extract palo alto&lt;BR /&gt;logs in csv format and do some excel dynamic table magic its a button on&lt;BR /&gt;top right in the monitor traffic logs&lt;BR /&gt;</description>
      <pubDate>Mon, 16 Jan 2023 15:06:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527220#M1320</guid>
      <dc:creator>GabrielMontiel</dc:creator>
      <dc:date>2023-01-16T15:06:15Z</dc:date>
    </item>
    <item>
      <title>Re: Complete application traffic report for firewall rule</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527337#M1322</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Well, I've tried the custom report filters and CSV exports but the thing is that there is to much data so the logs are incomplete. It won't give me the full logs.&lt;/P&gt;
&lt;P&gt;Is there a way to summarize them i Panorama? Now I see every new session from server to server with the same application in the exports, and it's a huge amount.&lt;/P&gt;
&lt;P&gt;I would just like to see every new application from server to server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can't really see that I can do this in the ACC filter either?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 06:44:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527337#M1322</guid>
      <dc:creator>JohnHogman</dc:creator>
      <dc:date>2023-01-17T06:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: Complete application traffic report for firewall rule</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527443#M1323</link>
      <description>Im not quite sure what  you mean with "server to server" if by that you&lt;BR /&gt;mean a single IP address, or a CIDR address range, you can see new&lt;BR /&gt;applications or the applications used within a single security policy rule,&lt;BR /&gt;with that you can separate each server flow with security policies and with&lt;BR /&gt;the policy optimizer in security policy GUI page theres a column named&lt;BR /&gt;"apps seen" you can click on that number and see which applications have&lt;BR /&gt;done a match with that security policy&lt;BR /&gt;</description>
      <pubDate>Tue, 17 Jan 2023 18:36:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527443#M1323</guid>
      <dc:creator>GabrielMontiel</dc:creator>
      <dc:date>2023-01-17T18:36:15Z</dc:date>
    </item>
    <item>
      <title>Re: Complete application traffic report for firewall rule</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527515#M1326</link>
      <description>&lt;P&gt;Okey just to clarify.&lt;/P&gt;
&lt;P&gt;Right now we have a rule that says any any from server nets to server nets on any application.&lt;/P&gt;
&lt;P&gt;So all server traffic floods on that rule. So it's alot of sessions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What we want to do is to make it more granular, like the examples:&lt;/P&gt;
&lt;P&gt;Server1 192.168.1.2 to Server2 192.168.2.3 HTTPS&lt;/P&gt;
&lt;P&gt;Server3 192.168.43.2 to Server4&amp;nbsp; 192.168.60.3 DNS&lt;/P&gt;
&lt;P&gt;and so on.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2023 08:12:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527515#M1326</guid>
      <dc:creator>JohnHogman</dc:creator>
      <dc:date>2023-01-18T08:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: Complete application traffic report for firewall rule</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527571#M1328</link>
      <description>Oh now i get you, best way to do this imo, is filter by the policy name on&lt;BR /&gt;monitor, extract CSV columns ( you can extend the amount of rows you can&lt;BR /&gt;export in device/panorama, on the setup page&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClaPCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClaPCAS&lt;/A&gt;&lt;BR /&gt;)&lt;BR /&gt;&lt;BR /&gt;And then start filtering with excel, and create the new policies above the&lt;BR /&gt;current general one, you can repeat this process until you have no new hits&lt;BR /&gt;on the old policy.&lt;BR /&gt;</description>
      <pubDate>Wed, 18 Jan 2023 16:06:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527571#M1328</guid>
      <dc:creator>GabrielMontiel</dc:creator>
      <dc:date>2023-01-18T16:06:15Z</dc:date>
    </item>
    <item>
      <title>Re: Complete application traffic report for firewall rule</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527927#M1331</link>
      <description>&lt;P&gt;Yepp that's what we tried to do, but it's just to many sessions.&lt;/P&gt;
&lt;P&gt;With the default setting of 65000 rows in CSV, gives us 1.5 hours of traffic and we want to see like a months traffic.&lt;/P&gt;
&lt;P&gt;So if we changed it to the max value of&amp;nbsp;&lt;SPAN&gt;1048576 rows in CSV, would give us approx. 1.5 days.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Can't see that there is a way to sort out all the duplicate sessions in the monitor view.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 09:08:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/complete-application-traffic-report-for-firewall-rule/m-p/527927#M1331</guid>
      <dc:creator>JohnHogman</dc:creator>
      <dc:date>2023-01-20T09:08:14Z</dc:date>
    </item>
  </channel>
</rss>

