<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Palo Alto Packet Capture Vs Monitor Vs Session Browser in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-packet-capture-vs-monitor-vs-session-browser/m-p/471571#M103123</link>
    <description>&lt;P&gt;Hi for a beginner why what does the packet capture enable me to do that the Monitor and Session Browser do not ? If possible please could someone give me a scenario for packet capture that identifies a problem which the other two would not pick up - is it the way traffic conversations are shown ? With the capture obviously you would be able to see a lot more detail about what is inside each packets.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With respect to the Monitor I understand that shows traffic associated with closed or unsuccessful sessions whereas session browser is for existing sessions. Any tips would be appreciated.&lt;/P&gt;</description>
    <pubDate>Wed, 09 Mar 2022 10:55:14 GMT</pubDate>
    <dc:creator>pink-panther</dc:creator>
    <dc:date>2022-03-09T10:55:14Z</dc:date>
    <item>
      <title>Palo Alto Packet Capture Vs Monitor Vs Session Browser</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-packet-capture-vs-monitor-vs-session-browser/m-p/471571#M103123</link>
      <description>&lt;P&gt;Hi for a beginner why what does the packet capture enable me to do that the Monitor and Session Browser do not ? If possible please could someone give me a scenario for packet capture that identifies a problem which the other two would not pick up - is it the way traffic conversations are shown ? With the capture obviously you would be able to see a lot more detail about what is inside each packets.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With respect to the Monitor I understand that shows traffic associated with closed or unsuccessful sessions whereas session browser is for existing sessions. Any tips would be appreciated.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 10:55:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-packet-capture-vs-monitor-vs-session-browser/m-p/471571#M103123</guid>
      <dc:creator>pink-panther</dc:creator>
      <dc:date>2022-03-09T10:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Packet Capture Vs Monitor Vs Session Browser</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-packet-capture-vs-monitor-vs-session-browser/m-p/471636#M103125</link>
      <description>&lt;P&gt;Monitor is the overall logging and inspection tab. Monitor --&amp;gt; Traffic specifically shows you completed traffic sessions with (depending on what you have selected in the Security rules options) the session start and stop times, as well as all the related session attributes (source/destination, region, classification, etc.), and final disposition of the session (end reason, filtering status, etc.). There may be multiple matching entries, as well as packet captures, under a Traffic log as the session progressed to completion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Monitor --&amp;gt; Session Browser, on the other hand, shows you current sessions across the PaloAlto. These are live connections between endpoints that may be further filtered as characteristics of the connection change (i.e. the session might be live and allowed at the moment under one rule, but later could be identified as a different form of traffic and blocked under a different rule). It shows you the live TCP/UDP/etc. at the moment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Monitor --&amp;gt; Packet Capture allows you to do a live packet capture on the PaloAlto, capturing the actual network packets between endpoints. This is a Wireshark/tcpdump style capture that shows you the raw traffic, not how the PaloAlto categorized/filtered that traffic. Generally you use this when you need to investigate actual packet contents and debug why a particular rule may/may not be acting of traffic as expected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As an example of packet capture, I was having a problem with the PA blocking traffic as being "STUN" packets, when STUN packets were allowed. The Traffic logs showed these identified as STUN, but on a non-standard port number and hence blocked. Using Packet Capture I was able to grab a sample and confirm these were in fact SIP packets that the PaloAlto was mis-identifying as STUN packets&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 16:05:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-packet-capture-vs-monitor-vs-session-browser/m-p/471636#M103125</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-03-09T16:05:47Z</dc:date>
    </item>
  </channel>
</rss>

