<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Certain TCP traffic not showing at the Azure Palo firewalls. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/certain-tcp-traffic-not-showing-at-the-azure-palo-firewalls/m-p/581376#M116364</link>
    <description>&lt;P&gt;not sure if reach Azure palo firewall since it's the Azure file sync service.&amp;nbsp; Not to a VM.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 22 Mar 2024 17:41:21 GMT</pubDate>
    <dc:creator>Vanessaxu</dc:creator>
    <dc:date>2024-03-22T17:41:21Z</dc:date>
    <item>
      <title>Certain TCP traffic not showing at the Azure Palo firewalls.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certain-tcp-traffic-not-showing-at-the-azure-palo-firewalls/m-p/578542#M116034</link>
      <description>&lt;P data-pm-slice="1 1 []"&gt;Certain TCP traffic not showing at the Azure Palo firewalls.&lt;/P&gt;
&lt;P data-pm-slice="1 1 []"&gt;There are tcp traffic from on-prem to Azure test subnet vm.&lt;/P&gt;
&lt;P&gt;The connection path is as below: on-prem user laptop -&amp;gt; onprem palo fw -&amp;gt; express route -&amp;gt;Azure Palo fw -&amp;gt; test vm.&lt;/P&gt;
&lt;P&gt;There is no NSG on any of the interfaces at Azure side.&lt;/P&gt;
&lt;P&gt;The RDP traffic from the on-prem user laptop can reach the test vm no problem (tcp 3389).&lt;/P&gt;
&lt;P&gt;The smb (i.e. TCP 139) traffic from the on-prem user laptop can only shown at the on-prem fw log, showing it was allowed and went out the same path to the express route, but timeout status.&lt;/P&gt;
&lt;P&gt;The smb traffic is not showing at the Azure palo fw. ( why the smb traffic disappeared after existing the on-prem fw?)&lt;/P&gt;
&lt;P&gt;The only difference is the on-prem laptop (prd domain) and the azure vm (test domain) belong to different AD domain controllers, with the same domain name.&lt;/P&gt;
&lt;P&gt;No drop packets on either palo fw.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 20:01:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certain-tcp-traffic-not-showing-at-the-azure-palo-firewalls/m-p/578542#M116034</guid>
      <dc:creator>Vanessaxu</dc:creator>
      <dc:date>2024-02-27T20:01:02Z</dc:date>
    </item>
    <item>
      <title>Re: Certain TCP traffic not showing at the Azure Palo firewalls.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certain-tcp-traffic-not-showing-at-the-azure-palo-firewalls/m-p/578633#M116052</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/195603"&gt;@Vanessaxu&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is the traffic actually reaching the Azure fw or is it going lost in transit ? Can you check with a PCAP ?&lt;/P&gt;
&lt;P&gt;Have you checked the global counters ? There might be drops there that don't show up in traffic log.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloNCAS" target="_blank" rel="noopener"&gt;How to check global counters for a specific source and destination IP address&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 12:17:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certain-tcp-traffic-not-showing-at-the-azure-palo-firewalls/m-p/578633#M116052</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-02-28T12:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: Certain TCP traffic not showing at the Azure Palo firewalls.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certain-tcp-traffic-not-showing-at-the-azure-palo-firewalls/m-p/581376#M116364</link>
      <description>&lt;P&gt;not sure if reach Azure palo firewall since it's the Azure file sync service.&amp;nbsp; Not to a VM.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 17:41:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certain-tcp-traffic-not-showing-at-the-azure-palo-firewalls/m-p/581376#M116364</guid>
      <dc:creator>Vanessaxu</dc:creator>
      <dc:date>2024-03-22T17:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: Certain TCP traffic not showing at the Azure Palo firewalls.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certain-tcp-traffic-not-showing-at-the-azure-palo-firewalls/m-p/581386#M116367</link>
      <description>&lt;P&gt;did a pcap, can't see the traffic incoming either.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2024 19:24:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certain-tcp-traffic-not-showing-at-the-azure-palo-firewalls/m-p/581386#M116367</guid>
      <dc:creator>Vanessaxu</dc:creator>
      <dc:date>2024-03-22T19:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: Certain TCP traffic not showing at the Azure Palo firewalls.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/certain-tcp-traffic-not-showing-at-the-azure-palo-firewalls/m-p/581892#M116427</link>
      <description>&lt;P&gt;&lt;SPAN&gt;forced traffic to the test vm via VPN, the traffic shows on the Azure Palo firewall log. Seems the the express route blocks certain traffic.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2024 14:41:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/certain-tcp-traffic-not-showing-at-the-azure-palo-firewalls/m-p/581892#M116427</guid>
      <dc:creator>Vanessaxu</dc:creator>
      <dc:date>2024-03-27T14:41:09Z</dc:date>
    </item>
  </channel>
</rss>

