<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Inspection of traffic with PPPoE headers in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/inspection-of-traffic-with-pppoe-headers/m-p/513796#M106693</link>
    <description>&lt;P&gt;I'm attempting to use a PA-440 in vwire mode to inspect traffic that is on the internet side of a broadband modem for security analysis. The traffic passes through the PA ok but non of the security policies seem to be triggered and no traffic logs are generated. Does anyone know if the Palo Alto firewall will inspect traffic that contains a PPPoE header?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I took a packet capture using the PA firewall and the flows look fine except for the PPP/PPPoE header. Wireshark decodes the applications correctly but not sure why the PA firewall doesn't generate any sessions or traffic logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a standard allow all rule in with logging enabled.&lt;/P&gt;</description>
    <pubDate>Fri, 02 Sep 2022 02:08:09 GMT</pubDate>
    <dc:creator>Daniel_Bloom</dc:creator>
    <dc:date>2022-09-02T02:08:09Z</dc:date>
    <item>
      <title>Inspection of traffic with PPPoE headers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inspection-of-traffic-with-pppoe-headers/m-p/513796#M106693</link>
      <description>&lt;P&gt;I'm attempting to use a PA-440 in vwire mode to inspect traffic that is on the internet side of a broadband modem for security analysis. The traffic passes through the PA ok but non of the security policies seem to be triggered and no traffic logs are generated. Does anyone know if the Palo Alto firewall will inspect traffic that contains a PPPoE header?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I took a packet capture using the PA firewall and the flows look fine except for the PPP/PPPoE header. Wireshark decodes the applications correctly but not sure why the PA firewall doesn't generate any sessions or traffic logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a standard allow all rule in with logging enabled.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Sep 2022 02:08:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inspection-of-traffic-with-pppoe-headers/m-p/513796#M106693</guid>
      <dc:creator>Daniel_Bloom</dc:creator>
      <dc:date>2022-09-02T02:08:09Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of traffic with PPPoE headers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inspection-of-traffic-with-pppoe-headers/m-p/513925#M106710</link>
      <description>&lt;P&gt;Security policy rules don’t apply to Layer 2 packets which might be the reason you don't see any live sessions or traffic logs. If you don't have defined any tags in the virtual wire object, untagged traffic is allowed without an explicit rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You should still be able to capture PPPoE packets tho. Is the filter configured to include non-IP traffic?&lt;/P&gt;</description>
      <pubDate>Mon, 05 Sep 2022 09:05:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inspection-of-traffic-with-pppoe-headers/m-p/513925#M106710</guid>
      <dc:creator>Neubauer</dc:creator>
      <dc:date>2022-09-05T09:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection of traffic with PPPoE headers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inspection-of-traffic-with-pppoe-headers/m-p/513975#M106718</link>
      <description>&lt;P&gt;I don't actually need the policies to apply to the PPPoE header, but would like the firewall to be able to inspect the layer 3-7 data like it normally would on traffic without the PPPoE header. From what I've observed, when the PPPoE header is also included in the packet the firewall just ignores the rest of the data. I did think about tunnel inspection policies but these don't apply to PPPoE only GRE/VXLAN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are no VLAN tags on this traffic but I've tested with and without tags defined on the vwire without success.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The capture filter did not include non-IP traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Sep 2022 23:35:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inspection-of-traffic-with-pppoe-headers/m-p/513975#M106718</guid>
      <dc:creator>Daniel_Bloom</dc:creator>
      <dc:date>2022-09-05T23:35:35Z</dc:date>
    </item>
  </channel>
</rss>

