<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy action is allow, but session-end-reason is &amp;quot;policy-deny&amp;quot; PAN 8.1.12 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525453#M108659</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We are facing something similar.&lt;/P&gt;
&lt;P&gt;A client trying to access from the internet side to our website and our FW for some reason deny the traffic.&lt;/P&gt;
&lt;P&gt;This happens only to one client while all other clients able to access the site normally.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we also see a traffic log with action ALLOW and session end reason POLICY-DENY.&lt;/P&gt;
&lt;P&gt;In the rule we only have VP profile but we don't see any threat log.&lt;/P&gt;
&lt;P&gt;we did see from the output of the command "show counter global filter delta yes packet-filter yes severity drop":&lt;/P&gt;
&lt;P&gt;flow_acion_close &amp;gt;&amp;gt; TCP sessions closed via injecting RST.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;we ran a flow basic debug:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;== 2022-12-28 14:15:30.994 +0200 ==&lt;BR /&gt;Packet received at ingress stage, tag 0, type ORDERED&lt;BR /&gt;Packet info: len 70 port 82 interface 129 vsys 1&lt;BR /&gt;wqe index 544734 packet 0x0x80000003942f40f8, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: 2c:b6:93:56:07:00-&amp;gt;b4:0c:25:e0:40:11, VLAN 3010 (0x8100 0x0bc2), type 0x0800&lt;BR /&gt;IP: Client-IP-&amp;gt;Server-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x08, len 52,&lt;BR /&gt;id 19914, frag_off 0x4000, ttl 119, checksum 1599(0x63f)&lt;BR /&gt;TCP: sport 58420, dport 443, seq 4187513754, ack 0,&lt;BR /&gt;reserved 0, offset 8, window 64240, checksum 33105,&lt;BR /&gt;flags 0x02 ( SYN), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;CP-DENY TCP non data packet getting through&lt;BR /&gt;Forwarding lookup, ingress interface 129&lt;BR /&gt;L3 mode, virtual-router 1&lt;BR /&gt;Route lookup in virtual-router 1, IP Server-IP&lt;BR /&gt;Route found, interface ae1.89, zone 5&lt;BR /&gt;Resolve ARP for IP Server-IP on interface ae1.89&lt;BR /&gt;ARP entry found on interface 190&lt;BR /&gt;Transmit packet size 52 on port 16&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;== 2022-12-28 14:15:30.959 +0200 ==&lt;BR /&gt;Packet received at fastpath stage, tag 548459, type ATOMIC&lt;BR /&gt;Packet info: len 70 port 80 interface 190 vsys 1&lt;BR /&gt;wqe index 545439 packet 0x0x80000003940430e4, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: 00:94:a1:56:25:8a-&amp;gt;b4:0c:25:e0:40:10, VLAN 89 (0x8100 0x0059), type 0x0800&lt;BR /&gt;IP: Server-IP-&amp;gt;Client-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x00, len 52,&lt;BR /&gt;id 37496, frag_off 0x4000, ttl 255, checksum 14744(0x3998)&lt;BR /&gt;TCP: sport 443, dport 58417, seq 1707377135, ack 3880782354,&lt;BR /&gt;reserved 0, offset 8, window 14520, checksum 51352,&lt;BR /&gt;flags 0x12 ( SYN ACK), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;00000000: 02 04 05 b4 01 03 03 02 04 02 00 00 ........ ....&lt;BR /&gt;Flow fastpath, session 548459 s2c (set work 0x800000038f346e80 exclude_video 0 from sp 0x80000002aa7d5e80 exclude_video 0)&lt;BR /&gt;* Dos Profile NULL (NO) Index (0/0) *&lt;BR /&gt;Syn Cookie: pan_reass(Init statete): c2s:1 c2s:nxtseq 3880782354 c2s:startseq 3880782354 c2s:win 14520 c2s:st 3 c2s:newsyn 0 :: s2c:nxtseq 1707377136 s2c:startseq 1707377136 s2c&lt;BR /&gt;:win 64240 s2c:st 3 s2c:newsyn 0 ack 3880782354 nosyn 0 plen 0&lt;BR /&gt;CP-DENY TCP non data packet getting through&lt;BR /&gt;Forwarding lookup, ingress interface 190&lt;BR /&gt;L3 mode, virtual-router 1&lt;BR /&gt;Route lookup in virtual-router 1, IP Client-IP&lt;BR /&gt;Route found, interface ae2.3010, zone 6, nexthop LinkProof-Float&lt;BR /&gt;Resolve ARP for IP LinkProof-Float on interface ae2.3010&lt;BR /&gt;ARP entry found on interface 129&lt;BR /&gt;Transmit packet size 52 on port 17&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any advice on what might be the reason for the traffic being dropped?&lt;/P&gt;</description>
    <pubDate>Thu, 29 Dec 2022 08:41:22 GMT</pubDate>
    <dc:creator>AmitKa79</dc:creator>
    <dc:date>2022-12-29T08:41:22Z</dc:date>
    <item>
      <title>Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/346164#M86464</link>
      <description>&lt;P&gt;Hi, All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="STHONG_0-1598937860696.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27573iB09D4A78775B49E8/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="STHONG_0-1598937860696.png" alt="STHONG_0-1598937860696.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The action of security policy is set to allow, but session-end-reason is shown as "policy-deny" in traffic monitor.&lt;/P&gt;&lt;P&gt;The PAN-OS version is 8.1.12 and SSL decryption is enabled.&lt;BR /&gt;Could someone please explain this to me?&lt;BR /&gt;If you need more information, please let me know.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Sep 2020 05:35:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/346164#M86464</guid>
      <dc:creator>STHONG</dc:creator>
      <dc:date>2020-09-01T05:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny&amp;quo</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/346224#M86479</link>
      <description>&lt;P&gt;there's several layers where sessions are inspected and where a poliy decission can be taken to drop connections&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The session is first processed at layer 3 where it is allowed or denied based on source/destination IP, source/destination zone and destination port and protocol. Once a connection is allowed based on the 6tuple, the traffic log will be an allow action, but the session may later be dropped due to an expired certificate (if ssl decryption is enabled) or an application switch or a threat profile that simply drops the connection&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;at the far-left of the log entry there's a log details icon that will show you more details and any related logs. this may shed some light on the reason for the session to get ended&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Sep 2020 11:22:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/346224#M86479</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-09-01T11:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny&amp;amp</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/346572#M86526</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your reply.&lt;BR /&gt;&lt;SPAN&gt;I checked the detailed log and found that the destination address is &lt;A href="https://api.snapcraft.io" target="_blank"&gt;https://api.snapcraft.io&lt;/A&gt;, and the certificate of this address is not expired but normal.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;And there were no blocked or denied sessions in the threat log.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Is there anything else I need to check?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="STHONG_0-1599110098476.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27612iDAE8103566142FA0/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="STHONG_0-1599110098476.png" alt="STHONG_0-1599110098476.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;/STHONG&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 05:21:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/346572#M86526</guid>
      <dc:creator>STHONG</dc:creator>
      <dc:date>2020-09-03T05:21:34Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/464191#M102456</link>
      <description>&lt;P&gt;Any Update&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 12:30:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/464191#M102456</guid>
      <dc:creator>Abdalhakeem</dc:creator>
      <dc:date>2022-02-08T12:30:39Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525453#M108659</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We are facing something similar.&lt;/P&gt;
&lt;P&gt;A client trying to access from the internet side to our website and our FW for some reason deny the traffic.&lt;/P&gt;
&lt;P&gt;This happens only to one client while all other clients able to access the site normally.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we also see a traffic log with action ALLOW and session end reason POLICY-DENY.&lt;/P&gt;
&lt;P&gt;In the rule we only have VP profile but we don't see any threat log.&lt;/P&gt;
&lt;P&gt;we did see from the output of the command "show counter global filter delta yes packet-filter yes severity drop":&lt;/P&gt;
&lt;P&gt;flow_acion_close &amp;gt;&amp;gt; TCP sessions closed via injecting RST.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;we ran a flow basic debug:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;== 2022-12-28 14:15:30.994 +0200 ==&lt;BR /&gt;Packet received at ingress stage, tag 0, type ORDERED&lt;BR /&gt;Packet info: len 70 port 82 interface 129 vsys 1&lt;BR /&gt;wqe index 544734 packet 0x0x80000003942f40f8, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: 2c:b6:93:56:07:00-&amp;gt;b4:0c:25:e0:40:11, VLAN 3010 (0x8100 0x0bc2), type 0x0800&lt;BR /&gt;IP: Client-IP-&amp;gt;Server-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x08, len 52,&lt;BR /&gt;id 19914, frag_off 0x4000, ttl 119, checksum 1599(0x63f)&lt;BR /&gt;TCP: sport 58420, dport 443, seq 4187513754, ack 0,&lt;BR /&gt;reserved 0, offset 8, window 64240, checksum 33105,&lt;BR /&gt;flags 0x02 ( SYN), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;CP-DENY TCP non data packet getting through&lt;BR /&gt;Forwarding lookup, ingress interface 129&lt;BR /&gt;L3 mode, virtual-router 1&lt;BR /&gt;Route lookup in virtual-router 1, IP Server-IP&lt;BR /&gt;Route found, interface ae1.89, zone 5&lt;BR /&gt;Resolve ARP for IP Server-IP on interface ae1.89&lt;BR /&gt;ARP entry found on interface 190&lt;BR /&gt;Transmit packet size 52 on port 16&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;== 2022-12-28 14:15:30.959 +0200 ==&lt;BR /&gt;Packet received at fastpath stage, tag 548459, type ATOMIC&lt;BR /&gt;Packet info: len 70 port 80 interface 190 vsys 1&lt;BR /&gt;wqe index 545439 packet 0x0x80000003940430e4, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: 00:94:a1:56:25:8a-&amp;gt;b4:0c:25:e0:40:10, VLAN 89 (0x8100 0x0059), type 0x0800&lt;BR /&gt;IP: Server-IP-&amp;gt;Client-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x00, len 52,&lt;BR /&gt;id 37496, frag_off 0x4000, ttl 255, checksum 14744(0x3998)&lt;BR /&gt;TCP: sport 443, dport 58417, seq 1707377135, ack 3880782354,&lt;BR /&gt;reserved 0, offset 8, window 14520, checksum 51352,&lt;BR /&gt;flags 0x12 ( SYN ACK), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;00000000: 02 04 05 b4 01 03 03 02 04 02 00 00 ........ ....&lt;BR /&gt;Flow fastpath, session 548459 s2c (set work 0x800000038f346e80 exclude_video 0 from sp 0x80000002aa7d5e80 exclude_video 0)&lt;BR /&gt;* Dos Profile NULL (NO) Index (0/0) *&lt;BR /&gt;Syn Cookie: pan_reass(Init statete): c2s:1 c2s:nxtseq 3880782354 c2s:startseq 3880782354 c2s:win 14520 c2s:st 3 c2s:newsyn 0 :: s2c:nxtseq 1707377136 s2c:startseq 1707377136 s2c&lt;BR /&gt;:win 64240 s2c:st 3 s2c:newsyn 0 ack 3880782354 nosyn 0 plen 0&lt;BR /&gt;CP-DENY TCP non data packet getting through&lt;BR /&gt;Forwarding lookup, ingress interface 190&lt;BR /&gt;L3 mode, virtual-router 1&lt;BR /&gt;Route lookup in virtual-router 1, IP Client-IP&lt;BR /&gt;Route found, interface ae2.3010, zone 6, nexthop LinkProof-Float&lt;BR /&gt;Resolve ARP for IP LinkProof-Float on interface ae2.3010&lt;BR /&gt;ARP entry found on interface 129&lt;BR /&gt;Transmit packet size 52 on port 17&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any advice on what might be the reason for the traffic being dropped?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2022 08:41:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525453#M108659</guid>
      <dc:creator>AmitKa79</dc:creator>
      <dc:date>2022-12-29T08:41:22Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525460#M108662</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/250117"&gt;@AmitKa79&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the scenarios where the traffic is denied even after the policy action is "Allow", the traffic is denied after the 3-way handshake (if not in all cases). You would have to share further flow basic so that it is identified as to why this traffic is denied?&lt;BR /&gt;&lt;BR /&gt;I agree with&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;as the traffic can be denied due to many factors as suggested previously even after the initial 3-way handshake is allowed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2022 10:48:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525460#M108662</guid>
      <dc:creator>Arnesh</dc:creator>
      <dc:date>2022-12-29T10:48:16Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525462#M108663</link>
      <description>&lt;P&gt;== 2022-12-28 14:15:30.994 +0200 ==&lt;BR /&gt;Packet received at ingress stage, tag 0, type ORDERED&lt;BR /&gt;Packet info: len 70 port 82 interface 129 vsys 1&lt;BR /&gt;wqe index 544734 packet 0x0x80000003942f40f8, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: 2c:b6:93:56:07:00-&amp;gt;b4:0c:25:e0:40:11, VLAN 3010 (0x8100 0x0bc2), type 0x0800&lt;BR /&gt;IP: Client-IP-&amp;gt;Server-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x08, len 52,&lt;BR /&gt;id 19914, frag_off 0x4000, ttl 119, checksum 1599(0x63f)&lt;BR /&gt;TCP: sport 58420, dport 443, seq 4187513754, ack 0,&lt;BR /&gt;reserved 0, offset 8, window 64240, checksum 33105,&lt;BR /&gt;flags 0x02 ( SYN), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;CP-DENY TCP non data packet getting through&lt;BR /&gt;Forwarding lookup, ingress interface 129&lt;BR /&gt;L3 mode, virtual-router 1&lt;BR /&gt;Route lookup in virtual-router 1, IP Server-IP&lt;BR /&gt;Route found, interface ae1.89, zone 5&lt;BR /&gt;Resolve ARP for IP Server-IP on interface ae1.89&lt;BR /&gt;ARP entry found on interface 190&lt;BR /&gt;Transmit packet size 52 on port 16&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;== 2022-12-28 14:15:30.959 +0200 ==&lt;BR /&gt;Packet received at fastpath stage, tag 548459, type ATOMIC&lt;BR /&gt;Packet info: len 70 port 80 interface 190 vsys 1&lt;BR /&gt;wqe index 545439 packet 0x0x80000003940430e4, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: 00:94:a1:56:25:8a-&amp;gt;b4:0c:25:e0:40:10, VLAN 89 (0x8100 0x0059), type 0x0800&lt;BR /&gt;IP: Server-IP-&amp;gt;Client-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x00, len 52,&lt;BR /&gt;id 37496, frag_off 0x4000, ttl 255, checksum 14744(0x3998)&lt;BR /&gt;TCP: sport 443, dport 58417, seq 1707377135, ack 3880782354,&lt;BR /&gt;reserved 0, offset 8, window 14520, checksum 51352,&lt;BR /&gt;flags 0x12 ( SYN ACK), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;00000000: 02 04 05 b4 01 03 03 02 04 02 00 00 ........ ....&lt;BR /&gt;Flow fastpath, session 548459 s2c (set work 0x800000038f346e80 exclude_video 0 from sp 0x80000002aa7d5e80 exclude_video 0)&lt;BR /&gt;* Dos Profile NULL (NO) Index (0/0) *&lt;BR /&gt;Syn Cookie: pan_reass(Init statete): c2s:1 c2s:nxtseq 3880782354 c2s:startseq 3880782354 c2s:win 14520 c2s:st 3 c2s:newsyn 0 :: s2c:nxtseq 1707377136 s2c:startseq 1707377136 s2c&lt;BR /&gt;:win 64240 s2c:st 3 s2c:newsyn 0 ack 3880782354 nosyn 0 plen 0&lt;BR /&gt;CP-DENY TCP non data packet getting through&lt;BR /&gt;Forwarding lookup, ingress interface 190&lt;BR /&gt;L3 mode, virtual-router 1&lt;BR /&gt;Route lookup in virtual-router 1, IP Client-IP&lt;BR /&gt;Route found, interface ae2.3010, zone 6, nexthop LinkProof-Float&lt;BR /&gt;Resolve ARP for IP LinkProof-Float on interface ae2.3010&lt;BR /&gt;ARP entry found on interface 129&lt;BR /&gt;Transmit packet size 52 on port 17&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;== 2022-12-28 14:15:30.959 +0200 ==&lt;BR /&gt;Packet received at fastpath stage, tag 103101, type ATOMIC&lt;BR /&gt;Packet info: len 70 port 81 interface 190 vsys 1&lt;BR /&gt;wqe index 548027 packet 0x0x80000003958c78e4, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: 00:94:a1:56:25:8a-&amp;gt;b4:0c:25:e0:40:10, VLAN 89 (0x8100 0x0059), type 0x0800&lt;BR /&gt;IP: Server-IP-&amp;gt;Client-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x00, len 52,&lt;BR /&gt;id 49846, frag_off 0x4000, ttl 255, checksum 2394(0x95a)&lt;BR /&gt;TCP: sport 443, dport 58418, seq 2764533183, ack 577938220,&lt;BR /&gt;reserved 0, offset 8, window 14520, checksum 51592,&lt;BR /&gt;flags 0x12 ( SYN ACK), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;CP-DENY TCP non data packet getting through&lt;BR /&gt;Forwarding lookup, ingress interface 129&lt;BR /&gt;L3 mode, virtual-router 1&lt;BR /&gt;Route lookup in virtual-router 1, IP Server-IP&lt;BR /&gt;Route found, interface ae1.89, zone 5&lt;BR /&gt;Resolve ARP for IP Server-IP on interface ae1.89&lt;BR /&gt;ARP entry found on interface 190&lt;BR /&gt;Transmit packet size 52 on port 16&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;== 2022-12-28 14:15:30.958 +0200 ==&lt;BR /&gt;Packet received at slowpath stage, tag 1465060809, type ATOMIC&lt;BR /&gt;Packet info: len 70 port 82 interface 129 vsys 1&lt;BR /&gt;wqe index 548013 packet 0x0x80000003949218f8, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: 2c:b6:93:56:07:00-&amp;gt;b4:0c:25:e0:40:11, VLAN 3010 (0x8100 0x0bc2), type 0x0800&lt;BR /&gt;IP: Client-IP-&amp;gt;Server-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x08, len 52,&lt;BR /&gt;id 19907, frag_off 0x4000, ttl 119, checksum 1606(0x646)&lt;BR /&gt;TCP: sport 58417, dport 443, seq 3880782353, ack 0,&lt;BR /&gt;reserved 0, offset 8, window 64240, checksum 60709,&lt;BR /&gt;flags 0x02 ( SYN), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;00000000: 02 04 05 ac 01 03 03 08 01 01 04 02 ........ ....&lt;BR /&gt;Session setup: vsys 1&lt;BR /&gt;PBF lookup (vsys 1) with application ssl&lt;BR /&gt;Session setup: ingress interface ae2.3010 egress interface ae1.89 (zone 5)&lt;BR /&gt;Policy lookup, matched rule index 42,&lt;BR /&gt;TCI_INSPECT: Do TCI lookup policy - appid 0&lt;BR /&gt;Allocated new session 548459.&lt;BR /&gt;set exclude_video in session 548459 0x80000002aa7d5e80 0 from work 0x800000038f397580 0&lt;BR /&gt;Created session, enqueue to install. work 0x800000038f397580 exclude_video 0,session 548459 0x80000002aa7d5e80 exclude_video 0&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;== 2022-12-28 14:15:30.958 +0200 ==&lt;BR /&gt;Packet received at ingress stage, tag 0, type ORDERED&lt;BR /&gt;Packet info: len 70 port 82 interface 129 vsys 1&lt;BR /&gt;wqe index 547400 packet 0x0x8000000393e338f8, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: 2c:b6:93:56:07:00-&amp;gt;b4:0c:25:e0:40:11, VLAN 3010 (0x8100 0x0bc2), type 0x0800&lt;BR /&gt;IP: Client-IP-&amp;gt;Server-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x08, len 52,&lt;BR /&gt;id 19908, frag_off 0x4000, ttl 119, checksum 1605(0x645)&lt;BR /&gt;TCP: sport 58418, dport 443, seq 577938219, ack 0,&lt;BR /&gt;reserved 0, offset 8, window 64240, checksum 6377,&lt;BR /&gt;flags 0x02 ( SYN), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;00000000: 02 04 05 ac 01 03 03 08 01 01 04 02 ........ ....&lt;BR /&gt;Flow lookup, key word0 0xe43201bb00060600 word1 0 word2 0xffff956aff80 word3 0x0 word4 0xffffc1a9591e&lt;BR /&gt;* Dos Profile NULL (NO) Index (0/0) *&lt;BR /&gt;Flow not found, HA 0&lt;BR /&gt;CP-DENY TCP non data packet getting through&lt;BR /&gt;Forwarding lookup, ingress interface 129&lt;BR /&gt;L3 mode, virtual-router 1&lt;BR /&gt;Route lookup in virtual-router 1, IP Server-IP&lt;BR /&gt;Route found, interface ae1.89, zone 5&lt;BR /&gt;Resolve ARP for IP Server-IP on interface ae1.89&lt;BR /&gt;ARP entry found on interface 190&lt;BR /&gt;Transmit packet size 40 on port 16&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;== 2022-12-28 14:15:25.895 +0200 ==&lt;BR /&gt;Packet received at fastpath stage, tag 300232, type ATOMIC&lt;BR /&gt;Packet info: len 64 port 82 interface 129 vsys 1&lt;BR /&gt;wqe index 543791 packet 0x0x8000000394ac70e4, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: 2c:b6:93:56:07:00-&amp;gt;b4:0c:25:e0:40:11, VLAN 3010 (0x8100 0x0bc2), type 0x0800&lt;BR /&gt;IP: Client-IP-&amp;gt;Server-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x08, len 46,&lt;BR /&gt;id 19906, frag_off 0x4000, ttl 119, checksum 1613(0x64d)&lt;BR /&gt;TCP: sport 58415, dport 443, seq 1170268787, ack 3301540227,&lt;BR /&gt;reserved 0, offset 5, window 516, checksum 37541,&lt;BR /&gt;flags 0x10 ( ACK), urgent data 0, l4 data len 6&lt;BR /&gt;TCP option:&lt;BR /&gt;Flow fastpath, session 300232 c2s (set work 0x800000038f313680 exclude_video 0 from sp 0x80000002a6b3bb80 exclude_video 0)&lt;BR /&gt;session 300232 packet sequeunce old 0 new 1&lt;BR /&gt;Flow action close for session 300232, option 3&lt;BR /&gt;2022-12-28 14:15:25.895 +0200 Warning: pan_ctd_start_session_can_be_decrypted(pan_ctd.c:3471): pan_proxy_proc_session() failed: -1&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;== 2022-12-28 14:15:25.895 +0200 ==&lt;BR /&gt;Packet received at forwarding stage, tag 300232, type ATOMIC&lt;BR /&gt;Packet info: len 58 port 82 interface 190 vsys 1&lt;BR /&gt;wqe index 545722 packet 0x0x8000000393e338c0, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: b4:0c:25:e0:40:11-&amp;gt;2c:b6:93:56:07:00, type 0x0800&lt;BR /&gt;IP: Server-IP-&amp;gt;Client-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x00, len 40,&lt;BR /&gt;id 15260, frag_off 0x0000, ttl 64, checksum 36737(0x8f81)&lt;BR /&gt;TCP: sport 443, dport 58415, seq 3301540227, ack 1170268793,&lt;BR /&gt;reserved 0, offset 5, window 516, checksum 43431,&lt;BR /&gt;flags 0x14 ( ACK RST), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;Forwarding lookup, ingress interface 190&lt;BR /&gt;L3 mode, virtual-router 1&lt;BR /&gt;Route lookup in virtual-router 1, IP Client-IP&lt;BR /&gt;Route found, interface ae2.3010, zone 6, nexthop LinkProof-Float&lt;BR /&gt;Resolve ARP for IP LinkProof-Float on interface ae2.3010&lt;BR /&gt;ARP entry found on interface 129&lt;BR /&gt;Transmit packet size 40 on port 17&lt;BR /&gt;CP-DENY TCP non data packet getting through&lt;BR /&gt;Forwarding lookup, ingress interface 190&lt;BR /&gt;L3 mode, virtual-router 1&lt;BR /&gt;Route lookup in virtual-router 1, IP Client-IP&lt;BR /&gt;Route found, interface ae2.3010, zone 6, nexthop LinkProof-Float&lt;BR /&gt;Resolve ARP for IP LinkProof-Float on interface ae2.3010&lt;BR /&gt;ARP entry found on interface 129&lt;BR /&gt;Transmit packet size 52 on port 17&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;== 2022-12-28 14:15:25.879 +0200 ==&lt;BR /&gt;Packet received at ingress stage, tag 0, type ORDERED&lt;BR /&gt;Packet info: len 70 port 82 interface 129 vsys 1&lt;BR /&gt;wqe index 551288 packet 0x0x80000003946968f8, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: 2c:b6:93:56:07:00-&amp;gt;b4:0c:25:e0:40:11, VLAN 3010 (0x8100 0x0bc2), type 0x0800&lt;BR /&gt;IP: Client-IP-&amp;gt;Server-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x08, len 52,&lt;BR /&gt;id 19902, frag_off 0x4000, ttl 119, checksum 1611(0x64b)&lt;BR /&gt;TCP: sport 58415, dport 443, seq 1170268786, ack 0,&lt;BR /&gt;reserved 0, offset 8, window 64240, checksum 46678,&lt;BR /&gt;flags 0x02 ( SYN), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;00000000: 02 04 05 ac 01 03 03 08 01 01 04 02 ........ ....&lt;BR /&gt;Flow lookup, key word0 0xe42f01bb00060600 word1 0 word2 0xffff956aff80 word3 0x0 word4 0xffffc1a9591e&lt;BR /&gt;* Dos Profile NULL (NO) Index (0/0) *&lt;BR /&gt;Flow not found, HA 0&lt;BR /&gt;Session setup: vsys 1&lt;BR /&gt;No active flow found, enqueue to create session&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;== 2022-12-28 14:15:25.879 +0200 ==&lt;BR /&gt;Packet received at slowpath stage, tag 1610831203, type ATOMIC&lt;BR /&gt;Packet info: len 70 port 82 interface 129 vsys 1&lt;BR /&gt;wqe index 551288 packet 0x0x80000003946968f8, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: 2c:b6:93:56:07:00-&amp;gt;b4:0c:25:e0:40:11, VLAN 3010 (0x8100 0x0bc2), type 0x0800&lt;BR /&gt;IP: Client-IP-&amp;gt;Server-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x08, len 52,&lt;BR /&gt;id 19902, frag_off 0x4000, ttl 119, checksum 1611(0x64b)&lt;BR /&gt;TCP: sport 58415, dport 443, seq 1170268786, ack 0,&lt;BR /&gt;reserved 0, offset 8, window 64240, checksum 46678,&lt;BR /&gt;flags 0x02 ( SYN), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;00000000: 02 04 05 ac 01 03 03 08 01 01 04 02 ........ ....&lt;BR /&gt;Session setup: vsys 1&lt;BR /&gt;PBF lookup (vsys 1) with application ssl&lt;BR /&gt;Session setup: ingress interface ae2.3010 egress interface ae1.89 (zone 5)&lt;BR /&gt;Policy lookup, matched rule index 42,&lt;BR /&gt;TCI_INSPECT: Do TCI lookup policy - appid 0&lt;BR /&gt;Allocated new session 300232.&lt;BR /&gt;set exclude_video in session 300232 0x80000002a6b3bb80 0 from work 0x800000038f3fdb00 0&lt;BR /&gt;Created session, enqueue to install. work 0x800000038f3fdb00 exclude_video 0,session 300232 0x80000002a6b3bb80 exclude_video 0&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;== 2022-12-28 14:15:25.879 +0200 ==&lt;BR /&gt;Packet received at fastpath stage, tag 300232, type ATOMIC&lt;BR /&gt;Packet info: len 70 port 82 interface 129 vsys 1&lt;BR /&gt;wqe index 551288 packet 0x0x80000003946968f8, HA: 0, IC: 0&lt;BR /&gt;Packet decoded dump:&lt;BR /&gt;L2: 2c:b6:93:56:07:00-&amp;gt;b4:0c:25:e0:40:11, VLAN 3010 (0x8100 0x0bc2), type 0x0800&lt;BR /&gt;IP: Client-IP-&amp;gt;Server-IP, protocol 6&lt;BR /&gt;version 4, ihl 5, tos 0x08, len 52,&lt;BR /&gt;id 19902, frag_off 0x4000, ttl 119, checksum 1611(0x64b)&lt;BR /&gt;TCP: sport 58415, dport 443, seq 1170268786, ack 0,&lt;BR /&gt;reserved 0, offset 8, window 64240, checksum 46678,&lt;BR /&gt;flags 0x02 ( SYN), urgent data 0, l4 data len 0&lt;BR /&gt;TCP option:&lt;BR /&gt;00000000: 02 04 05 ac 01 03 03 08 01 01 04 02 ........ ....&lt;BR /&gt;57%&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2022 11:37:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525462#M108663</guid>
      <dc:creator>AmitKa79</dc:creator>
      <dc:date>2022-12-29T11:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525463#M108664</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/250117"&gt;@AmitKa79&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The most common reason I have seen for the apparent oxymoron of allow and policy-deny is the traffic is denied due to decryption policy.&amp;nbsp; Please see this thread &lt;A href="https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/td-p/165865" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/td-p/165865&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The logs actually make sense because the traffic is allowed by security policy, but denied by another policy.&amp;nbsp; Do you have decryption enabled?&amp;nbsp; If so, please check the decryption logs.&amp;nbsp; If not, please let us know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2022 13:35:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525463#M108664</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-12-29T13:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525464#M108665</link>
      <description>&lt;P&gt;we are not applying decryption policy for that traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2022 13:46:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525464#M108665</guid>
      <dc:creator>AmitKa79</dc:creator>
      <dc:date>2022-12-29T13:46:45Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525465#M108666</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;.&lt;BR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/250117"&gt;@AmitKa79&lt;/a&gt;&amp;nbsp;Although the session does not seem to be complete in the logs for any particular session (I traced via sport). I can see the below log which seems to be due to decryption failing.&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;2022-12-28 14:15:25.895 +0200 Warning: pan_ctd_start_session_can_be_decrypted(pan_ctd.c:3471): pan_proxy_proc_session() failed: -1&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this the only site which is facing the issue? What is the website you are accessing and the PAN-OS of the firewall?&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2022 13:52:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525465#M108666</guid>
      <dc:creator>Arnesh</dc:creator>
      <dc:date>2022-12-29T13:52:49Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525466#M108667</link>
      <description>&lt;P&gt;&lt;SPAN&gt;we are not applying decryption policy for that traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;in the traffic logs we see in the application - ssl.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2022 13:55:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525466#M108667</guid>
      <dc:creator>AmitKa79</dc:creator>
      <dc:date>2022-12-29T13:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525469#M108669</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AmitKa79_0-1672322398417.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46564iFC0F2615D2B2A4D4/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AmitKa79_0-1672322398417.png" alt="AmitKa79_0-1672322398417.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2022 14:00:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525469#M108669</guid>
      <dc:creator>AmitKa79</dc:creator>
      <dc:date>2022-12-29T14:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525473#M108672</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/250117"&gt;@AmitKa79&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have a "no-decrypt" rule?&amp;nbsp; If so, the decryption profile can still be applied and deny traffic even it it is not decrypted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there anything in the decryption logs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2022 15:12:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525473#M108672</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-12-29T15:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525477#M108674</link>
      <description>&lt;P&gt;In first screenshot "Decrypted" column is "yes".&lt;/P&gt;
&lt;P&gt;It means you are decrypting this traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2022 15:35:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525477#M108674</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2022-12-29T15:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525479#M108675</link>
      <description>&lt;P&gt;The first image relates to someone elses issue which is similar to ours.&lt;/P&gt;
&lt;P&gt;This  is our logs&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AmitKa79_0-1672322398417.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46565i8E6FA6EFA15409F7/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AmitKa79_0-1672322398417.png" alt="AmitKa79_0-1672322398417.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2022 15:39:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525479#M108675</guid>
      <dc:creator>AmitKa79</dc:creator>
      <dc:date>2022-12-29T15:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: Policy action is allow, but session-end-reason is "policy-deny" PAN 8.1.12</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525486#M108676</link>
      <description>&lt;P&gt;Go to Monitor &amp;gt; Packet Capture&lt;/P&gt;
&lt;P&gt;Add 2 filters where. One where source is client IP and destination server IP.&lt;/P&gt;
&lt;P&gt;Second other way around.&lt;/P&gt;
&lt;P&gt;Turn on filter.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1672334845963.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46567i05830765131B2814/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1672334845963.png" alt="Raido_Rattameister_0-1672334845963.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Go to firewall cli.&lt;/P&gt;
&lt;P&gt;Enter command:&lt;/P&gt;
&lt;P&gt;&amp;gt; show counter global filter delta yes packet-filter yes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try to to access destination again.&lt;/P&gt;
&lt;P&gt;Enter command "show counter global filter delta yes packet-filter yes" again.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Paste output of second "show counter global filter delta yes packet-filter yes" here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2022 17:29:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-action-is-allow-but-session-end-reason-is-quot-policy/m-p/525486#M108676</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2022-12-29T17:29:13Z</dc:date>
    </item>
  </channel>
</rss>

