<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA equivalent of ASA packet tracer? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/1086292#M122915</link>
    <description>&lt;P&gt;Hi &lt;SPAN style="background: var(--ck-color-mention-background); color: var(--ck-color-mention-text);"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1156642319"&gt;@D.Tamburin&lt;/a&gt;&lt;/SPAN&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can hit the CLI with a couple of commands to test phase 1 and 2:&lt;BR /&gt;&lt;BR /&gt;test vpn ike-sa gateway &amp;lt;gateway-name&amp;gt;&lt;BR /&gt;test vpn ipsec-sa tunnel &amp;lt;tunnel-name&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If all parameters are good to go, youll see phase 1 and 2 statuses turn green. You can also verify via system logs.&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jan 2025 04:03:18 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2025-01-16T04:03:18Z</dc:date>
    <item>
      <title>PA equivalent of ASA packet tracer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/51221#M37689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One of the more useful features in troubleshooting on the PIX/ASA (which we used until recently) is the packet tracer, which allows us to enter source/destination IP/port, etc and check to see if a given connection is allowed or blocked, and by which rule. Is there an equivalent feature in the PA units?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2013 15:09:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/51221#M37689</guid>
      <dc:creator>philparadis</dc:creator>
      <dc:date>2013-01-10T15:09:59Z</dc:date>
    </item>
    <item>
      <title>Re: PA equivalent of ASA packet tracer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/51222#M37690</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Phil,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a very useful packet capture tool embedded in Panos (Monitor tab --&amp;gt;packet capture in GUI). &lt;/P&gt;&lt;P&gt;You can configured several filters and capture traffic in different process stage. (&lt;EM&gt;receive&lt;/EM&gt;, &lt;EM&gt;transmit&lt;/EM&gt;, &lt;EM&gt;drop&lt;/EM&gt; and &lt;EM&gt;firewall&lt;/EM&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To get security rule matching for a given traffic, you can also use the&amp;nbsp; &lt;EM&gt;#test security-policy-match&lt;/EM&gt; command from CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Nicolas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2013 15:27:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/51222#M37690</guid>
      <dc:creator>nbilly</dc:creator>
      <dc:date>2013-01-10T15:27:57Z</dc:date>
    </item>
    <item>
      <title>Re: PA equivalent of ASA packet tracer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/51223#M37691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Speaking of which, what about decrypted traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can that be captured aswell, and if not - if filing this as a feature request, does the hardware support this in some way (or would it just be a waste of time to describe this feature request)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess it could be done because Wildfire can get a copy of files transmitted by ssl/https and send for analyze.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2013 20:23:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/51223#M37691</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-01-10T20:23:24Z</dc:date>
    </item>
    <item>
      <title>Re: PA equivalent of ASA packet tracer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/157486#M51647</link>
      <description>&lt;P&gt;I'll revive this question - as the answers didn't actually relate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Cisco ASA packet tracer allows you to propose a hypothetical flow and runs it through the engine as if it were real. Evaluating the NAT and route dicisions which would likely apply in addition to the policy/ACL allow/deny logic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It was very helpful to see if your configured configuration should pass traffic you are planning for prior to the actual traffic arriving.&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2017 18:15:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/157486#M51647</guid>
      <dc:creator>MatthewSabin</dc:creator>
      <dc:date>2017-05-19T18:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: PA equivalent of ASA packet tracer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/157492#M51648</link>
      <description>&lt;P&gt;Well it is not that easy with Layer 7 firewall.&lt;/P&gt;&lt;P&gt;If you want to test application sharepoint-admin then session ca go&amp;nbsp;through many steps like incomplete, web-browsing, sharepoint-base, and then get's to sharepoint-admin.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So test would also need to check if every application your requested application depends on is permitted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But test capability is there.&lt;/P&gt;&lt;P&gt;&lt;A title="https://live.paloaltonetworks.com/t5/Management-Articles/How-To-Test-Security-NAT-and-PBF-Rules-via-the-CLI/ta-p/55911" href="https://live.paloaltonetworks.com/t5/Management-Articles/How-To-Test-Security-NAT-and-PBF-Rules-via-the-CLI/ta-p/55911" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/How-To-Test-Security-NAT-and-PBF-Rules-via-the-CLI/ta-p/55911&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2017 18:38:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/157492#M51648</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-19T18:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: PA equivalent of ASA packet tracer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/157507#M51654</link>
      <description>&lt;P&gt;Another good point mate! Not easy to simulate Layer 7 traffic&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2017 19:57:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/157507#M51654</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-19T19:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: PA equivalent of ASA packet tracer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/157653#M51688</link>
      <description>&lt;P&gt;I know what you are thinking of in the ASA and I don't think there is a Palo equivalent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can source your ping/traceroute&amp;nbsp;and the system will tell you the logical response. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; ping source &amp;lt;ip-address-on-dataplane&amp;gt; host &amp;lt;destination-ip-address&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="crayon-e"&gt;&amp;gt; traceroute &lt;SPAN&gt;source &amp;lt;ip-address-on-dataplane&amp;gt; host&amp;nbsp;8.8.8.8&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="crayon-e"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="crayon-e"&gt;&lt;SPAN&gt;But as everyone else stated this will only tell you basic networking/services and not check any of the layer 7 policies in place.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2017 15:09:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/157653#M51688</guid>
      <dc:creator>ChrisRussell</dc:creator>
      <dc:date>2017-05-22T15:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: PA equivalent of ASA packet tracer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/406313#M92087</link>
      <description>&lt;P&gt;I think most are missing the point of the original question.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In Cisco's ASA, Packet tracer allows you to query traffic flow using the current ACL/Rules in place.&lt;/P&gt;&lt;P&gt;so for argument sake, say user on 10.10.20.111 is trying to connect to say 172.16.50.9 on port 443, but claims the firewall is blocking them. You can emulate that traffic. This is a vital tool for rule querying.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The command below would check as to successful, or dropped&lt;/P&gt;&lt;P&gt;#packet-tracer input inside tcp 10.10.20.111 2222 172.16.50.9 443 detail&lt;/P&gt;&lt;P&gt;this is up to layer 4 of the OSI, which gives good details on: known route/path, NAT and whether there is a supporting rule. If the packet gets dropped, there is good information which points out where and why it was dropped. Which gives guidance on what needs to be added to resolve it.&lt;/P&gt;&lt;P&gt;I have found the monitor tab to be lacking when compared to packet trace&lt;/P&gt;</description>
      <pubDate>Wed, 12 May 2021 10:01:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/406313#M92087</guid>
      <dc:creator>Chris777</dc:creator>
      <dc:date>2021-05-12T10:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: PA equivalent of ASA packet tracer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/1085894#M122912</link>
      <description>&lt;P&gt;I came to ask this exact question.&amp;nbsp; It also did a good job of forcing the tunnel up, so you could check on establishment also.&lt;/P&gt;
&lt;P&gt;Anyone know of a way to test the tunnel on a Palo?&amp;nbsp; I am also just coming over from cisco.&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 18:13:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/1085894#M122912</guid>
      <dc:creator>D.Tamburin</dc:creator>
      <dc:date>2025-01-15T18:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: PA equivalent of ASA packet tracer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/1086292#M122915</link>
      <description>&lt;P&gt;Hi &lt;SPAN style="background: var(--ck-color-mention-background); color: var(--ck-color-mention-text);"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1156642319"&gt;@D.Tamburin&lt;/a&gt;&lt;/SPAN&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can hit the CLI with a couple of commands to test phase 1 and 2:&lt;BR /&gt;&lt;BR /&gt;test vpn ike-sa gateway &amp;lt;gateway-name&amp;gt;&lt;BR /&gt;test vpn ipsec-sa tunnel &amp;lt;tunnel-name&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If all parameters are good to go, youll see phase 1 and 2 statuses turn green. You can also verify via system logs.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 04:03:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/1086292#M122915</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-01-16T04:03:18Z</dc:date>
    </item>
    <item>
      <title>Re: PA equivalent of ASA packet tracer?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/1086296#M122916</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1156642319"&gt;@D.Tamburin&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;One of the biggest changes that you'll find coming from Cisco is that PAN doesn't need any interested traffic to bring a tunnel online. The tunnels will automatically be created and don't need frequent traffic to keep them established as long as the other side also functions the same way. &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/220841"&gt;@JayGolf&lt;/a&gt; seems to have already given you to test commands; you can also run the show command of the same to see if phase 1 and phase 2 are already established.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 04:11:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-equivalent-of-asa-packet-tracer/m-p/1086296#M122916</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-01-16T04:11:53Z</dc:date>
    </item>
  </channel>
</rss>

