<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Action of  allow  but of Type policy deny in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230261#M124418</link>
    <description>&lt;P&gt;Take destination IP of failed session.&lt;/P&gt;
&lt;P&gt;Check URL logs to understand what site is being accessed.&lt;/P&gt;
&lt;P&gt;It is either strict decryption profile (allows only crypto parameters that client/server are not capable of), pinned certificate or missing CA in client.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If decryption logs say "Received fatal alert UnknownCA from client. CA Issuer URL:..." then either your clients don't trust Palo CA certificate or application inside client has pinned cert.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In case of pinned cert you either pass this traffic through firewall without decryption or block it. No third option.&lt;/P&gt;</description>
    <pubDate>Wed, 28 May 2025 18:07:20 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2025-05-28T18:07:20Z</dc:date>
    <item>
      <title>Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1229976#M124375</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;panos 11.2:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I am using SSL Inspection for all inbound traffic on my web sites.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Certain TLS connections with TLS inspection enabled did not work. Looking at the traffic log the connections shows an&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Action of “allow”&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;but of&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Type “deny” with Session End Reason of “policy-deny”.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No decryption logs issues (even the log flag for decryption profile is enabled for both Start and End sessions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Policy is quite strict (allow incoming ssl and web-browsing. ports 443 and 80)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can't find the "policy-deny" root.&lt;/P&gt;
&lt;P&gt;Tracing the packets shows no issue with decryption as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 24 May 2025 22:23:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1229976#M124375</guid>
      <dc:creator>chens</dc:creator>
      <dc:date>2025-05-24T22:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1229982#M124377</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80392"&gt;@chens&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I always liked that when the session end reason was 'threat' that you could see the threat log in the Detailed Log View.&amp;nbsp; I don't know why PANW does not do that with the session end reason of 'policy-deny'.&amp;nbsp; It would be so efficient for the NGFW to show the corresponding policy log.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt; opened a TAC case on this years ago and TAC said it is always a decryption issue.&amp;nbsp; &lt;A href="https://live.paloaltonetworks.com/t5/general-topics/identify-policy-deny-source/td-p/208306" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/identify-policy-deny-source/td-p/208306&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With that said, you can grab the session ID from the Detailed Log View and use the filter ( sessionid eq '82516' ) under the Decryption logs to confirm there is no decryption log for the session.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only other issue &lt;EM&gt;that I know&lt;/EM&gt; that does not show up in the decryption log is this one -&amp;gt; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000kI0RCAU" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000kI0RCAU&lt;/A&gt;.&amp;nbsp;&amp;nbsp;You could test by running the CLI command.&amp;nbsp; If you do not want to make changes to a production NGFW, you could try creating a packet filter to match the session and running the CLI command 'show counter global filter packet-filter yes | match incomplete'.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That's all I got.&amp;nbsp; To repeat, PANW really should have the Detailed Log View show the corresponding log just like they do with threat.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Sun, 25 May 2025 13:47:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1229982#M124377</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-05-25T13:47:59Z</dc:date>
    </item>
    <item>
      <title>Re: Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230004#M124380</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="154" data-end="201"&gt;This is quite a concerning situation, isn't it?&lt;/P&gt;
&lt;P data-start="203" data-end="322"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="203" data-end="322"&gt;We are currently seeing a denial of nearly 50% of the traffic, and we still have no clear indication of the root cause.&lt;/P&gt;
&lt;P data-start="203" data-end="322"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="324" data-end="436"&gt;I attempted to run the CLI command related to the SSL incomplete issue, but unfortunately, the problem persists. I have not observed the expected SSL incomplete counter anyway.&lt;/P&gt;
&lt;P data-start="324" data-end="436"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="438" data-end="571"&gt;As for the TAC response from 2018, they mentioned that these are internal SSL messages and assured that a fix would be provided soon.&lt;/P&gt;
&lt;P data-start="438" data-end="571"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="573" data-end="629"&gt;Looking forward to your insights or any updates on this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 May 2025 22:20:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230004#M124380</guid>
      <dc:creator>chens</dc:creator>
      <dc:date>2025-05-25T22:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230005#M124381</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80392"&gt;@chens&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you opened a TAC case?&amp;nbsp; I don't have any more insights or updates.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Sun, 25 May 2025 23:29:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230005#M124381</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-05-25T23:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230090#M124391</link>
      <description>&lt;P&gt;yes, 3 days ago.&lt;/P&gt;
&lt;P&gt;They are not answering.&lt;/P&gt;
&lt;P&gt;I start to think of offloading SSL using 3rd party device&lt;/P&gt;</description>
      <pubDate>Mon, 26 May 2025 14:37:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230090#M124391</guid>
      <dc:creator>chens</dc:creator>
      <dc:date>2025-05-26T14:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230119#M124398</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80392"&gt;@chens&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't work for PANW.&amp;nbsp; I create all my TAC cases in the CSP, and I always get an answer.&amp;nbsp; SSL decryption on my NGFWs works fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This community is primarily users that just want to help each other.&amp;nbsp; I've done what I can.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Good luck with your issue,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 26 May 2025 18:25:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230119#M124398</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-05-26T18:25:16Z</dc:date>
    </item>
    <item>
      <title>Re: Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230245#M124411</link>
      <description>&lt;P&gt;Having this exact same issue.&amp;nbsp; Came here to do research before opening a case.&amp;nbsp; I will open a case and if it gets resolved post here.&lt;/P&gt;
&lt;P&gt;Davidt&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2025 12:32:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230245#M124411</guid>
      <dc:creator>D.Tamburin</dc:creator>
      <dc:date>2025-05-28T12:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230246#M124412</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I have opened a ticket 4 days ago. I dont know what happened but they are just answering: plz wait for engineer. I am waiting 4 days!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;99% its a bug in pan-os.&lt;/P&gt;
&lt;P&gt;I dont know if its just false alarms, because we do not see clients or application errors.&lt;/P&gt;
&lt;P&gt;Or maybe the tcp stack try resend automtically and thats the reason this issue is transparent for clients.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyway, i have decided for the meanwhile to offload ssl with nginx and then forward plain to pan-os.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am quite sure its pan-os bug.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2025 12:40:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230246#M124412</guid>
      <dc:creator>chens</dc:creator>
      <dc:date>2025-05-28T12:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230249#M124413</link>
      <description>&lt;P&gt;Found this...&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000kI0RCAU" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000kI0RCAU&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2025 13:39:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230249#M124413</guid>
      <dc:creator>D.Tamburin</dc:creator>
      <dc:date>2025-05-28T13:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230250#M124414</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1156642319"&gt;@D.Tamburin&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks, but i already tryied that.&lt;/P&gt;
&lt;P&gt;It's not relevant since the KB refers to other issues (that reflects the same error)&lt;/P&gt;
&lt;P&gt;Anyway, if very old and mitigated after 8.x...&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2025 14:07:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230250#M124414</guid>
      <dc:creator>chens</dc:creator>
      <dc:date>2025-05-28T14:07:35Z</dc:date>
    </item>
    <item>
      <title>Re: Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230261#M124418</link>
      <description>&lt;P&gt;Take destination IP of failed session.&lt;/P&gt;
&lt;P&gt;Check URL logs to understand what site is being accessed.&lt;/P&gt;
&lt;P&gt;It is either strict decryption profile (allows only crypto parameters that client/server are not capable of), pinned certificate or missing CA in client.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If decryption logs say "Received fatal alert UnknownCA from client. CA Issuer URL:..." then either your clients don't trust Palo CA certificate or application inside client has pinned cert.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In case of pinned cert you either pass this traffic through firewall without decryption or block it. No third option.&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2025 18:07:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230261#M124418</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-05-28T18:07:20Z</dc:date>
    </item>
    <item>
      <title>Re: Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230262#M124419</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Thanks for answer.&lt;/P&gt;
&lt;P&gt;As i mentioned in the begining, we are dealing here with inbound ssl inspection. Not forwarding.&lt;/P&gt;
&lt;P&gt;I am using simple digicert trusted certificate. The palo also holds all the intermediate certs of the CA.&lt;/P&gt;
&lt;P&gt;Same issue happens even with self signed by the palo itself.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;P.s&lt;/P&gt;
&lt;P&gt;All certificates of course installed on backend nginx servers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Policy deny with no explain or error.&lt;/P&gt;
&lt;P&gt;Nothing.&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2025 18:19:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230262#M124419</guid>
      <dc:creator>chens</dc:creator>
      <dc:date>2025-05-28T18:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230265#M124420</link>
      <description>&lt;P&gt;Do you have decryption profile attached to the inbound ssl decryption policy?&lt;/P&gt;
&lt;P&gt;What algorithms you permit in decyption profile (Objects &amp;gt; Decryption &amp;gt; Decryption Profile / SSL Decryption &amp;gt; SSL Protocol Settings tab).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Add "Session ID" column into your traffic log view.&lt;/P&gt;
&lt;P&gt;Copy session that has issues from traffic log (it looks like "( sessionid eq '3473517' )") and paste it into decryption log.&lt;/P&gt;
&lt;P&gt;Do you see any errors or unsupported ssl protocols for the failed session?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2025 18:26:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230265#M124420</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-05-28T18:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: Action of  allow  but of Type policy deny</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230363#M124437</link>
      <description>&lt;P&gt;From all of the posts here I haven't seen anything where the traffic deny was identified.&amp;nbsp; The "allow" action was for the Layer 3/4, but somewhere in L5-7 the firewall took a block action and it WILL be logged.&amp;nbsp; Check the data filtering, URL, threat, decryption...et al logs, somewhere one of these logs will show the reason for your ultimate deny action.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Like mentioned before it's possible/probable that it would be a decryption issue.&amp;nbsp; Also previously mentioned was a decryption profile.&amp;nbsp; You can look there.&amp;nbsp; What settings do you have enabled there?&amp;nbsp; Does the server have an encryption certificate using unsupported parameters?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/reference/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-2/cipher-suites-supported-in-pan-os-10-2-decryption" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/reference/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-2/cipher-suites-supported-in-pan-os-10-2-decryption&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2025 13:50:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-of-allow-but-of-type-policy-deny/m-p/1230363#M124437</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2025-05-29T13:50:51Z</dc:date>
    </item>
  </channel>
</rss>

