<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic No Logs for matched rule in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/no-logs-for-matched-rule/m-p/566476#M114477</link>
    <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are facing a strange problem with one of our PA-220.&lt;/P&gt;
&lt;P&gt;I created a rule to allow all traffic between 2 different zones with our default log settings. The problem is that I only see a hand full hits and nothing in the traffic log.&lt;/P&gt;
&lt;P&gt;Yes there is traffic because I see it when I start the paket capture. There is traffic in booth directions. When I disable the created policy I also see droped traffic in the "interzone-default deny" policy. After enabling the policy I didn't see the deny that traffic anymore because the rule match. I also tried the "Test Policy Match" and it shows also the created rule.&lt;/P&gt;
&lt;P&gt;The traffic I'm searching is SIP Port 5060. The same policy match for example ICMP Ping which I see in the Traffic log!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone an idea why I didn't see my SIP traffic but ICMP traffic?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Tue, 21 Nov 2023 12:06:39 GMT</pubDate>
    <dc:creator>ARiegebauer</dc:creator>
    <dc:date>2023-11-21T12:06:39Z</dc:date>
    <item>
      <title>No Logs for matched rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/no-logs-for-matched-rule/m-p/566476#M114477</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are facing a strange problem with one of our PA-220.&lt;/P&gt;
&lt;P&gt;I created a rule to allow all traffic between 2 different zones with our default log settings. The problem is that I only see a hand full hits and nothing in the traffic log.&lt;/P&gt;
&lt;P&gt;Yes there is traffic because I see it when I start the paket capture. There is traffic in booth directions. When I disable the created policy I also see droped traffic in the "interzone-default deny" policy. After enabling the policy I didn't see the deny that traffic anymore because the rule match. I also tried the "Test Policy Match" and it shows also the created rule.&lt;/P&gt;
&lt;P&gt;The traffic I'm searching is SIP Port 5060. The same policy match for example ICMP Ping which I see in the Traffic log!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone an idea why I didn't see my SIP traffic but ICMP traffic?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 12:06:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/no-logs-for-matched-rule/m-p/566476#M114477</guid>
      <dc:creator>ARiegebauer</dc:creator>
      <dc:date>2023-11-21T12:06:39Z</dc:date>
    </item>
    <item>
      <title>Re: No Logs for matched rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/no-logs-for-matched-rule/m-p/566478#M114478</link>
      <description>&lt;P&gt;are your sip sessions long lived? a log is only created once a session ends so you wont see anything as long as the session is active&lt;/P&gt;
&lt;P&gt;you can trace your sessions via `show session all filter source x destination y' (or from zoneX to zoneY)&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 12:18:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/no-logs-for-matched-rule/m-p/566478#M114478</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-11-21T12:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: No Logs for matched rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/no-logs-for-matched-rule/m-p/566479#M114479</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/173549"&gt;@ARiegebauer&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The solution is most likely what &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt; said.&amp;nbsp; In addition to the CLI he mentioned you can see the sessions:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Under Monitor &amp;gt; Session Browser (active sessions)&lt;/LI&gt;
&lt;LI&gt;If you really want to see the logs in the traffic log you can check the Log at Session Start box in addition to Log at Session end for the 1 security policy rule.&amp;nbsp; This "&lt;SPAN&gt;&lt;SPAN class="richTextArea slds-text-longform tile__title red-txt"&gt;puts extra load on the management plane's CPU&lt;/SPAN&gt;&lt;/SPAN&gt;" but should be fine for only 1 rule.&amp;nbsp; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clt5CAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clt5CAC&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 12:30:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/no-logs-for-matched-rule/m-p/566479#M114479</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-11-21T12:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: No Logs for matched rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/no-logs-for-matched-rule/m-p/566481#M114480</link>
      <description>&lt;P&gt;I see a session in the session browser. Does it mean that there is an active session since 23:13:07 and it is still open and it should work?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 12:48:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/no-logs-for-matched-rule/m-p/566481#M114480</guid>
      <dc:creator>ARiegebauer</dc:creator>
      <dc:date>2023-11-21T12:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: No Logs for matched rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/no-logs-for-matched-rule/m-p/566483#M114481</link>
      <description>&lt;P&gt;Exactly!&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 13:06:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/no-logs-for-matched-rule/m-p/566483#M114481</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-11-21T13:06:32Z</dc:date>
    </item>
  </channel>
</rss>

