<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet drops with Unknown-TCP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/packet-drops-with-unknown-tcp/m-p/591331#M117760</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Thanks for the response.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But when we allow IP it is working fine &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; Also i can see the URL filtering rule is being hit. And i allowed Any service Any application. I can see RST when i run the debug.&lt;/P&gt;</description>
    <pubDate>Mon, 08 Jul 2024 06:54:48 GMT</pubDate>
    <dc:creator>Sanjay_Ramaiah</dc:creator>
    <dc:date>2024-07-08T06:54:48Z</dc:date>
    <item>
      <title>Packet drops with Unknown-TCP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-drops-with-unknown-tcp/m-p/591021#M117712</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;Need your suggestion on below. We have created a policy to allow access to a site with URL filtering.&lt;/P&gt;
&lt;P&gt;Created new category to the specific set of URL and then allowed the same in URL Filtering Profile and called the same in ACL. Source is set to LAN Range, Destination is set to Any, Application is set to Any, Service is set to Any, URL Category is set to the specific category, Action Allow.&lt;/P&gt;
&lt;P&gt;So while users try to access the URL i can see Insufficient data(App) is hitting the correct rule though, and then Unknown-TCP(App) hitting the interzone-default rule and getting dropped.&lt;/P&gt;
&lt;P&gt;As per my understanding the packets should hit the rule i created as i have allowed Any application but it is being denied by default rule. I run the packet capture i can see some of the packets are getting Reset.Not understanding what could be the reason. I went through the below KB&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClibCAC#:~:text=Unknown%2Dtcp%20means%20the%20firewall,firewall%20does%20not%20have%20signatures" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClibCAC#:~:text=Unknown%2Dtcp%20means%20the%20firewall,firewall%20does%20not%20have%20signatures&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Though it is relavent not giving enough info to solve this issue. Please suggest how i can proceed further.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 08:29:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-drops-with-unknown-tcp/m-p/591021#M117712</guid>
      <dc:creator>Sanjay_Ramaiah</dc:creator>
      <dc:date>2024-07-03T08:29:27Z</dc:date>
    </item>
    <item>
      <title>Re: Packet drops with Unknown-TCP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-drops-with-unknown-tcp/m-p/591108#M117729</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/249853"&gt;@Sanjay_Ramaiah&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Something isn't matching and the interzone-default policy is likely preventing you from identifying what it is. I would create a temporary rule at the bottom of your rulebase allowing all traffic from a test machine and attempt the same process again. Ensure that you have logging fully enabled on your temporary policy and that you have a URL profile that has every single category set to at least alert.&lt;/P&gt;
&lt;P&gt;Once they run a test and it's functional, you'll want to review ever everything hitting the temporary rule and identify the traffic that is catching that policy. In the logs you'll be able to identify something that isn't matching your URL category you've created for some reason.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 20:10:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-drops-with-unknown-tcp/m-p/591108#M117729</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-07-03T20:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: Packet drops with Unknown-TCP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-drops-with-unknown-tcp/m-p/591331#M117760</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Thanks for the response.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But when we allow IP it is working fine &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; Also i can see the URL filtering rule is being hit. And i allowed Any service Any application. I can see RST when i run the debug.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2024 06:54:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-drops-with-unknown-tcp/m-p/591331#M117760</guid>
      <dc:creator>Sanjay_Ramaiah</dc:creator>
      <dc:date>2024-07-08T06:54:48Z</dc:date>
    </item>
    <item>
      <title>Re: Packet drops with Unknown-TCP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-drops-with-unknown-tcp/m-p/591339#M117761</link>
      <description>&lt;P&gt;Anyhow i wil try this suggested idea&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Will keep you posted.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2024 08:00:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-drops-with-unknown-tcp/m-p/591339#M117761</guid>
      <dc:creator>Sanjay_Ramaiah</dc:creator>
      <dc:date>2024-07-08T08:00:42Z</dc:date>
    </item>
  </channel>
</rss>

