<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Inbound traffic to DMZ issue in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-traffic-to-dmz-issue/m-p/28033#M20458</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have reports of certain users not being able to access our public website but majority of users are able to. The traffic log shows that the application is incomplete. Packet capture reveals the 3-way handshake does not complete and the session times out. The same person who is NOT able to access the public website is able to access another website of ours that is hosted on another IP address but on the same firewall. The difference between the two sites are as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Different external IPs but same subnet&lt;/P&gt;&lt;P&gt;Different internal Zones (1 server is on DMZ; not working and 1 server is on the Trust zone; working)&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Different gateways, different switches&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The DMZ's gateway is the firewall while the server on the trust side's gateway is a core switch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone seen something like this before? Again, it works for 99% of the users but there are a number of users that are not able to get to the website for some reason. We initially thought it could be a routing issue with the ISP that we use since majority of the users who reported the issue belongs to the same ISP that we use. HOWEVER, we did find a user who uses the same ISP and IS ABLE to browse.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT is a regular destination NAT&lt;/P&gt;&lt;P&gt;Untrust to Untrust&lt;/P&gt;&lt;P&gt;Src IP: Any&lt;/P&gt;&lt;P&gt;Dst IP: Public IP of server&lt;/P&gt;&lt;P&gt;Destination translation IP: DMZ IP of the server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy is a regular allow inbound policy&lt;/P&gt;&lt;P&gt;allow access to website&lt;/P&gt;&lt;P&gt;Zone: Untrust to DMZ&lt;/P&gt;&lt;P&gt;Src IP: Any&lt;/P&gt;&lt;P&gt;Dst IP: External IP of DMZ server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some other info that might help.&lt;/P&gt;&lt;P&gt;There are two ISPs but only one is used and the other is a backup in case the other one is down. I'm using PBF to achieve this as per the PBF doc/KB.&lt;/P&gt;&lt;P&gt;There is a zone protection profile and enabled all of them. I removed it temporarily but it didn't help.&lt;/P&gt;&lt;P&gt;I tried to do a static bi-directional NAT as a test but it didn't seem to help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Jan 2015 02:16:18 GMT</pubDate>
    <dc:creator>x</dc:creator>
    <dc:date>2015-01-28T02:16:18Z</dc:date>
    <item>
      <title>Inbound traffic to DMZ issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-traffic-to-dmz-issue/m-p/28033#M20458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have reports of certain users not being able to access our public website but majority of users are able to. The traffic log shows that the application is incomplete. Packet capture reveals the 3-way handshake does not complete and the session times out. The same person who is NOT able to access the public website is able to access another website of ours that is hosted on another IP address but on the same firewall. The difference between the two sites are as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Different external IPs but same subnet&lt;/P&gt;&lt;P&gt;Different internal Zones (1 server is on DMZ; not working and 1 server is on the Trust zone; working)&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Different gateways, different switches&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The DMZ's gateway is the firewall while the server on the trust side's gateway is a core switch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone seen something like this before? Again, it works for 99% of the users but there are a number of users that are not able to get to the website for some reason. We initially thought it could be a routing issue with the ISP that we use since majority of the users who reported the issue belongs to the same ISP that we use. HOWEVER, we did find a user who uses the same ISP and IS ABLE to browse.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT is a regular destination NAT&lt;/P&gt;&lt;P&gt;Untrust to Untrust&lt;/P&gt;&lt;P&gt;Src IP: Any&lt;/P&gt;&lt;P&gt;Dst IP: Public IP of server&lt;/P&gt;&lt;P&gt;Destination translation IP: DMZ IP of the server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy is a regular allow inbound policy&lt;/P&gt;&lt;P&gt;allow access to website&lt;/P&gt;&lt;P&gt;Zone: Untrust to DMZ&lt;/P&gt;&lt;P&gt;Src IP: Any&lt;/P&gt;&lt;P&gt;Dst IP: External IP of DMZ server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some other info that might help.&lt;/P&gt;&lt;P&gt;There are two ISPs but only one is used and the other is a backup in case the other one is down. I'm using PBF to achieve this as per the PBF doc/KB.&lt;/P&gt;&lt;P&gt;There is a zone protection profile and enabled all of them. I removed it temporarily but it didn't help.&lt;/P&gt;&lt;P&gt;I tried to do a static bi-directional NAT as a test but it didn't seem to help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 02:16:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-traffic-to-dmz-issue/m-p/28033#M20458</guid>
      <dc:creator>x</dc:creator>
      <dc:date>2015-01-28T02:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound traffic to DMZ issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-traffic-to-dmz-issue/m-p/28034#M20459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi X,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide us snap shot for traffic log. If only one packet is sent and 0 packets are recieved than most likely web-server is not responding. There are other possibilities as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, please provide us snap shot for traffic log first, based on that detail we can provide some information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 02:58:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-traffic-to-dmz-issue/m-p/28034#M20459</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2015-01-28T02:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound traffic to DMZ issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-traffic-to-dmz-issue/m-p/28035#M20460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello x,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;It would be difficult to isolate the issue from above mentioned description. There could be many reasons, while traffic was not through the PAN firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;I would suggest a few things to check if there would be another occurrence of the same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;In the GUI --&amp;gt; Traffic log, you may use filters like &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333311080933px; font-family: inherit;"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;addr&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;.&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;src&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; in IP_ADD_OF_THE_TESTING_PC [public IP]&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333311080933px; font-family: inherit;"&gt;)&lt;/SPAN&gt; and &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333311080933px; font-family: inherit;"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;addr&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;.&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;dst&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; in IP_ADD_OF_THE_DESTINATION&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333311080933px; font-family: inherit;"&gt; )&lt;/SPAN&gt; to check the security policy that the traffic hitting. &lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;Also you&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; can check the real time session in the CLI by using 'show session all filter &lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;source&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; IP_ADD_OF_THE_TESTING_PC destination IP_ADD_OF_THE_DESTINATION'.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&amp;gt;&amp;nbsp; If there is &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333311080933px; font-family: inherit;"&gt;an&lt;/SPAN&gt; session exist for the same traffic,&amp;nbsp; then please &lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 13.3333311080933px; font-family: inherit;"&gt;apply&amp;nbsp; CLI command PAN&amp;gt; show session id XYZ&amp;nbsp;&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; to get detailed information about that session, &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333311080933px; font-family: inherit;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 13.3333311080933px; font-family: inherit;"&gt;i.e&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 13.3333311080933px; font-family: inherit;"&gt; NAT rule, security rule, ingress/egress interface etc.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt;&amp;nbsp; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;verify&lt;/SPAN&gt; the global counters, if a specific "DRP" counter is increasing rapidly. &lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;The command &lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: 'courier new', courier;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;show&lt;/SPAN&gt; counter global&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt; provides information about the processes/actions taken on the packets going through the device; if they are dropped, &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;nat&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;ed&lt;/SPAN&gt;, decrypted etc.&amp;nbsp; These counters are for all the traffic going through the device and are useful in troubleshooting issues; like poor performance, packet loss, latency etc. It is advised to use the command &lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: 'courier new', courier;"&gt;show counter global filter packet-filter yes delta yes&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt; in conjunction with filters to obtain meaningful data.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;For more information, you can follow the DOC &lt;A _jive_internal="true" data-containerid="2027" data-containertype="14" data-objectid="4650" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-4650" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #006595;"&gt;What is the Significance of Global Counters?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; You can enable FLOW BASIC feature to understand the exact reason behind the failure:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;diag&lt;/SPAN&gt; clear all&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;diag&lt;/SPAN&gt; set filter match source&amp;nbsp; IP_ADD_OF_THE_TESTING_PC destination IP_ADD_OF_THE_DESTINATION&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;diag&lt;/SPAN&gt; set filter match source IP_ADD_OF_THE_DESTINATION destination&amp;nbsp; IP_ADD_OF_THE_TESTING_PC&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;diag&lt;/SPAN&gt; set log feature flow &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;basic&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;diag&lt;/SPAN&gt; set log feature &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;tcp&lt;/SPAN&gt; all&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;diag&lt;/SPAN&gt; set filter on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&amp;gt; &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;debug&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; packet-&lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;diag&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; set log on&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;~~~~~~~~~~~~~~~~ Initiate traffic through the PAN firewall/try to browse a website ~~~~~~~~~~~~~~~~~~~~~~~~~&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;diag&lt;/SPAN&gt; set log off&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;diag&lt;/SPAN&gt; aggregate-logs&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;less&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;mp&lt;/SPAN&gt;-log pan_packetdiag_log.log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;For more information, you can follow the DOC: &lt;A _jive_internal="true" data-containerid="2027" data-containertype="14" data-objectid="1506" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-1506" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #006595;"&gt;Packet Capture, Debug Flow-basic and Counter Commands&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 13px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2015 03:13:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-traffic-to-dmz-issue/m-p/28035#M20460</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2015-01-28T03:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound traffic to DMZ issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-traffic-to-dmz-issue/m-p/79225#M43210</link>
      <description>&lt;P&gt;I am configuring inbound traffic on a PA-500, to allow traffic from the internet to reach a web server in the DMZ.&lt;/P&gt;
&lt;P&gt;I've followed the examples found in this forum and the internet traffic still does not reach a web server in the DMZ. &amp;nbsp;The U-turn doesn't work either for internal users. &amp;nbsp;&amp;nbsp;Internal users can get to the web sever via &lt;U&gt;internal route&lt;/U&gt;. The only thing I still don't know is if I need a static route in the Virtual Router to route&lt;U&gt; inbound traffic&lt;/U&gt;. &amp;nbsp;Does anyone have any idea? &amp;nbsp;Please help. &amp;nbsp;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2016 21:37:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-traffic-to-dmz-issue/m-p/79225#M43210</guid>
      <dc:creator>Keson</dc:creator>
      <dc:date>2016-06-06T21:37:33Z</dc:date>
    </item>
    <item>
      <title>Issue Found Re: Inbound traffic to DMZ issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-traffic-to-dmz-issue/m-p/79304#M43239</link>
      <description>&lt;P&gt;I found the solution by myself and post the result here so others may benefit from it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The external IP of the server "hidden" in the DMZ must be in the same subnet as the untrust interface.&amp;nbsp; This is how the external IP of the server can be found, translated (NAT'ed) and allowed on through the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope you find it helpful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Keson&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2016 17:43:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-traffic-to-dmz-issue/m-p/79304#M43239</guid>
      <dc:creator>Keson</dc:creator>
      <dc:date>2016-06-07T17:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound traffic to DMZ issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/inbound-traffic-to-dmz-issue/m-p/448229#M100793</link>
      <description>&lt;P&gt;Did you ever find a solution to this problem?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Nov 2021 18:15:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/inbound-traffic-to-dmz-issue/m-p/448229#M100793</guid>
      <dc:creator>Claudech</dc:creator>
      <dc:date>2021-11-17T18:15:29Z</dc:date>
    </item>
  </channel>
</rss>

