<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Interzone default deny rule with logging is allowing traffic and shows up in traffic logs in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547625#M111862</link>
    <description>&lt;P&gt;Hi Tony, I did open a ticket with PA and they are also researching the issue. And yes, there was some traffic that was leaked during one of the commits as in out of the 3 logs, 1 out 3 logs match one of the commit times but the other 2 won't. Even leaking traffic during commit is a huge flag as far as i know. Here are the screenshots from magnifying glass.&lt;/P&gt;</description>
    <pubDate>Wed, 28 Jun 2023 20:15:07 GMT</pubDate>
    <dc:creator>Akhil_B</dc:creator>
    <dc:date>2023-06-28T20:15:07Z</dc:date>
    <item>
      <title>Interzone default deny rule with logging is allowing traffic and shows up in traffic logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547596#M111857</link>
      <description>&lt;P&gt;We have a PA-3220 which is running in 10.2.4 Pan OS, we observed something really weird in the traffic logs this morning which shows 'ms-rdp' connections allowing through the default interzone deny rule which we re-verified again to see it is still set to 'deny' and no one really touched the rule. This is really freaking us out? Any insight on why this is happening and what would be a solution to this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 16:24:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547596#M111857</guid>
      <dc:creator>Akhil_B</dc:creator>
      <dc:date>2023-06-28T16:24:26Z</dc:date>
    </item>
    <item>
      <title>Re: Interzone default deny rule with logging is allowing traffic and shows up in traffic logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547620#M111859</link>
      <description>&lt;P&gt;I'm definitely no expert but I have had some odd things occur with traffic when doing commits to the firewall particularly when changing the name of anything.&amp;nbsp; I don't see how that would apply here though. I'd be curious if these two bits of traffic were allowed during a commit and how much traffic was allowed to traverse the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Might be helpful to have the details on the allowed traffic from the magnifying glass. It would disturb me enough to open a ticket with support to find out why.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 20:01:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547620#M111859</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-06-28T20:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: Interzone default deny rule with logging is allowing traffic and shows up in traffic logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547625#M111862</link>
      <description>&lt;P&gt;Hi Tony, I did open a ticket with PA and they are also researching the issue. And yes, there was some traffic that was leaked during one of the commits as in out of the 3 logs, 1 out 3 logs match one of the commit times but the other 2 won't. Even leaking traffic during commit is a huge flag as far as i know. Here are the screenshots from magnifying glass.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 20:15:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547625#M111862</guid>
      <dc:creator>Akhil_B</dc:creator>
      <dc:date>2023-06-28T20:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: Interzone default deny rule with logging is allowing traffic and shows up in traffic logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547626#M111863</link>
      <description>&lt;P&gt;I'd agree.&amp;nbsp; Leaks would be disturbing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I find it interesting though that in session 923204 which has a massive amount of traffic labeled to that interzone rule if the firewall is getting confused when labeling what rule it applies to. I'm curious why it started under a different rule at 8:56 but then shifted at the end to interzone at 9:46 despite nothing obvious changing. Was that rule removed or changed (the Aany2Ju...) that would have caused that session to stay open or change which rule would apply?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I'm not sure what the firewall does usually with open sessions when the rules change mid-session but I have had some things done that presumably would shut down a GlobalProtect session yet its still open even after a rule change which makes me think its taking a shortcut when applying the rules later in the session.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 20:24:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547626#M111863</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-06-28T20:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: Interzone default deny rule with logging is allowing traffic and shows up in traffic logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547674#M111865</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/173136"&gt;@Akhil_B&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've seen similar behavior with Panorama managed firewalls where&lt;SPAN&gt; the customer configured an override on the local firewalls for the interzone-default security policy with action set to 'allow' directly on the firewall itself.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Could it be that you are running into a similar issue ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Kind regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-Kim.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 08:14:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547674#M111865</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2023-06-29T08:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: Interzone default deny rule with logging is allowing traffic and shows up in traffic logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547700#M111867</link>
      <description>&lt;P&gt;I hadn't thought of the override but that is an excellent point. I've run into others issues with overrides that aren't obvious from the start or with duplicate names at different template stack levels.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 11:36:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547700#M111867</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-06-29T11:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: Interzone default deny rule with logging is allowing traffic and shows up in traffic logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547730#M111876</link>
      <description>&lt;P&gt;Have you been able to verify&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;'s pointer?&lt;/P&gt;
&lt;P&gt;Another thing you may want to check is the deeper details of the log:&lt;/P&gt;
&lt;P&gt;A session might get allowed at an early stage (source/destination/port) but eventually no longer be able to hit an security rule because it morphed into an application for which there is no allow OR drop rule. This will cause the session to fizzle out on the default rule and this may look weird&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 14:03:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/547730#M111876</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-06-29T14:03:45Z</dc:date>
    </item>
    <item>
      <title>Re: Interzone default deny rule with logging is allowing traffic and shows up in traffic logs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/548838#M112030</link>
      <description>&lt;P&gt;Hi Kiwi,&lt;/P&gt;
&lt;P&gt;This is not a panorama managed firewall. We just started introducing Panorama into our environment but this firewall is not even connected to the Panorama yet.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 02:15:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interzone-default-deny-rule-with-logging-is-allowing-traffic-and/m-p/548838#M112030</guid>
      <dc:creator>Akhil_B</dc:creator>
      <dc:date>2023-07-11T02:15:21Z</dc:date>
    </item>
  </channel>
</rss>

