<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Seeson end reason aged out in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/78997#M43097</link>
    <description>&lt;P&gt;HI friends,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have created interzone rule looks like below&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;lt;entry name="Rule1&amp;gt;&lt;BR /&gt; &amp;lt;profile-setting&amp;gt;&lt;BR /&gt; &amp;lt;profiles&amp;gt;&lt;BR /&gt; &amp;lt;url-filtering&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;default&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/url-filtering&amp;gt;&lt;BR /&gt; &amp;lt;virus&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;default&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/virus&amp;gt;&lt;BR /&gt; &amp;lt;spyware&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;Sinkhole&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/spyware&amp;gt;&lt;BR /&gt; &amp;lt;vulnerability&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;VP Profile&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/vulnerability&amp;gt;&lt;BR /&gt; &amp;lt;file-blocking&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;Wildfire&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/file-blocking&amp;gt;&lt;BR /&gt; &amp;lt;/profiles&amp;gt;&lt;BR /&gt; &amp;lt;/profile-setting&amp;gt;&lt;BR /&gt; &amp;lt;to&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;A&amp;lt;/member&amp;gt;&amp;lt;member&amp;gt;B&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/to&amp;gt;&lt;BR /&gt; &amp;lt;from&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;A&amp;lt;/member&amp;gt;&amp;nbsp;&amp;lt;member&amp;gt;B&amp;lt;/member&amp;gt;&amp;nbsp;&lt;SPAN&gt;&amp;lt;member&amp;gt;c&amp;lt;/member&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt; &amp;lt;/from&amp;gt;&lt;BR /&gt; &amp;lt;source&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;&lt;SPAN&gt;*.*.*.*&lt;/SPAN&gt;&amp;lt;/member&amp;gt;&amp;lt;member&amp;gt;&lt;SPAN&gt;*.*.*.*&lt;/SPAN&gt;&amp;lt;/member&amp;gt;&amp;lt;member&amp;gt;&lt;SPAN&gt;*.*.*.*&lt;/SPAN&gt;&amp;lt;/member&amp;gt;&amp;lt;member&amp;gt;&lt;SPAN&gt;*.*.*.*&lt;/SPAN&gt;&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/source&amp;gt;&lt;BR /&gt; &amp;lt;destination&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;&lt;SPAN&gt;*.*.*.*&lt;/SPAN&gt;&amp;lt;/member&amp;gt;&amp;lt;member&amp;gt;*.*.*.*&amp;lt;/member&amp;gt;&amp;lt;member&amp;gt;&lt;SPAN&gt;*.*.*.*&lt;/SPAN&gt;&amp;lt;/member&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;/destination&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;source-user&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;any&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/source-user&amp;gt;&lt;BR /&gt; &amp;lt;category&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;any&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/category&amp;gt;&lt;BR /&gt; &amp;lt;application&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;icmp&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;nagios&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;ntp&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;ping&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;snmp&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;snmp-trap&amp;lt;/member&amp;gt;&lt;BR /&gt;&amp;lt;/application&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the rule is triggering perfectly but it's showing aged out and in application field it showing insufficient-data custumer saying he is not getting respone can anyboady help how to solve this??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and i have checked ping from FW CLI to detination in above rule it's successfull and getting response but still in firewall it's showing aged out????? is this someting PAN needs to worry about??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kindly suggest&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Jun 2016 10:09:51 GMT</pubDate>
    <dc:creator>KotreshaMC</dc:creator>
    <dc:date>2016-06-02T10:09:51Z</dc:date>
    <item>
      <title>Seeson end reason aged out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/78997#M43097</link>
      <description>&lt;P&gt;HI friends,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have created interzone rule looks like below&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;lt;entry name="Rule1&amp;gt;&lt;BR /&gt; &amp;lt;profile-setting&amp;gt;&lt;BR /&gt; &amp;lt;profiles&amp;gt;&lt;BR /&gt; &amp;lt;url-filtering&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;default&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/url-filtering&amp;gt;&lt;BR /&gt; &amp;lt;virus&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;default&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/virus&amp;gt;&lt;BR /&gt; &amp;lt;spyware&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;Sinkhole&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/spyware&amp;gt;&lt;BR /&gt; &amp;lt;vulnerability&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;VP Profile&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/vulnerability&amp;gt;&lt;BR /&gt; &amp;lt;file-blocking&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;Wildfire&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/file-blocking&amp;gt;&lt;BR /&gt; &amp;lt;/profiles&amp;gt;&lt;BR /&gt; &amp;lt;/profile-setting&amp;gt;&lt;BR /&gt; &amp;lt;to&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;A&amp;lt;/member&amp;gt;&amp;lt;member&amp;gt;B&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/to&amp;gt;&lt;BR /&gt; &amp;lt;from&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;A&amp;lt;/member&amp;gt;&amp;nbsp;&amp;lt;member&amp;gt;B&amp;lt;/member&amp;gt;&amp;nbsp;&lt;SPAN&gt;&amp;lt;member&amp;gt;c&amp;lt;/member&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt; &amp;lt;/from&amp;gt;&lt;BR /&gt; &amp;lt;source&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;&lt;SPAN&gt;*.*.*.*&lt;/SPAN&gt;&amp;lt;/member&amp;gt;&amp;lt;member&amp;gt;&lt;SPAN&gt;*.*.*.*&lt;/SPAN&gt;&amp;lt;/member&amp;gt;&amp;lt;member&amp;gt;&lt;SPAN&gt;*.*.*.*&lt;/SPAN&gt;&amp;lt;/member&amp;gt;&amp;lt;member&amp;gt;&lt;SPAN&gt;*.*.*.*&lt;/SPAN&gt;&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/source&amp;gt;&lt;BR /&gt; &amp;lt;destination&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;&lt;SPAN&gt;*.*.*.*&lt;/SPAN&gt;&amp;lt;/member&amp;gt;&amp;lt;member&amp;gt;*.*.*.*&amp;lt;/member&amp;gt;&amp;lt;member&amp;gt;&lt;SPAN&gt;*.*.*.*&lt;/SPAN&gt;&amp;lt;/member&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;/destination&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;source-user&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;any&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/source-user&amp;gt;&lt;BR /&gt; &amp;lt;category&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;any&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;/category&amp;gt;&lt;BR /&gt; &amp;lt;application&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;icmp&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;nagios&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;ntp&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;ping&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;snmp&amp;lt;/member&amp;gt;&lt;BR /&gt; &amp;lt;member&amp;gt;snmp-trap&amp;lt;/member&amp;gt;&lt;BR /&gt;&amp;lt;/application&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the rule is triggering perfectly but it's showing aged out and in application field it showing insufficient-data custumer saying he is not getting respone can anyboady help how to solve this??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and i have checked ping from FW CLI to detination in above rule it's successfull and getting response but still in firewall it's showing aged out????? is this someting PAN needs to worry about??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kindly suggest&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 10:09:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/78997#M43097</guid>
      <dc:creator>KotreshaMC</dc:creator>
      <dc:date>2016-06-02T10:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: Seeson end reason aged out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79002#M43101</link>
      <description>&lt;P&gt;To make the rule truly interzone you'd need to set the type to interzone also:&lt;/P&gt;
&lt;P&gt;&amp;lt;rule-type&amp;gt;interzone&amp;lt;/rule-type&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The rule itself looks ok, but the behavior you're reporting sounds like there might be a network issue. if you look into the details of the traffic logs, can you see packets reported in both directions ?&lt;/P&gt;
&lt;P&gt;insufficient data is usually reported when there is asymmetric flow which ping will not report as request and reply are independent, but will impact TCP severely&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can set up packetcaptures to make sure packets are going out and being received as expected. Some more details like traffic log and a topology could be helpful too&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 11:23:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79002#M43101</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-06-02T11:23:29Z</dc:date>
    </item>
    <item>
      <title>kRe: Seeson end reason aged out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79006#M43103</link>
      <description>&lt;P&gt;Hi thanks for the response,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yeah we have included that interzone rule but forgot to mention here.&lt;/P&gt;
&lt;P&gt;we checked PCAP also but found that no response and traffic details also bytes received is showing 0.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 11:35:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79006#M43103</guid>
      <dc:creator>KotreshaMC</dc:creator>
      <dc:date>2016-06-02T11:35:09Z</dc:date>
    </item>
    <item>
      <title>Re: kRe: Seeson end reason aged out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79008#M43104</link>
      <description>&lt;P&gt;if packets are leaving the firewall as expected but none are returning, the next step is to go check at the remote end if packets are being received properly and where the reply is going&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is the source IP part of a NAT policy, does the host have a route for it, does the next hop router have proper routing for it etc&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 11:57:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79008#M43104</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-06-02T11:57:41Z</dc:date>
    </item>
    <item>
      <title>Re: kRe: Seeson end reason aged out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79010#M43105</link>
      <description>&lt;P&gt;How can we confirm it's leaving the firewall??&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 12:11:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79010#M43105</guid>
      <dc:creator>KotreshaMC</dc:creator>
      <dc:date>2016-06-02T12:11:47Z</dc:date>
    </item>
    <item>
      <title>Re: kRe: Seeson end reason aged out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79011#M43106</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can perform PCAPs on the firewall in 4 different stages :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-receive&lt;/P&gt;
&lt;P&gt;-transmit&lt;/P&gt;
&lt;P&gt;-drop&lt;/P&gt;
&lt;P&gt;-firewall&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The&amp;nbsp;transmit stage is what the firewall sends out.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check the following article on how to configure PCAPs :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Packet-Capture/ta-p/72069" target="_blank"&gt;Getting-Started-Packet-Capture&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope it helps,&lt;/P&gt;
&lt;P&gt;-Kim&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 12:18:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79011#M43106</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2016-06-02T12:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: kRe: Seeson end reason aged out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79012#M43107</link>
      <description>&lt;P&gt;a good indication is if the traffic log contains a 'packet sent' count. you should be able to use thelog details to ascertain if NAT is being applied by looking at the 'NAT Source IP' column&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for some more info regarding packetcaptures (these will also help identify 'sent' and 'received' packets), please check out this article:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Packet-Capture/ta-p/72069" target="_blank"&gt;Getting Started: Packet Capture &lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 12:19:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79012#M43107</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-06-02T12:19:18Z</dc:date>
    </item>
    <item>
      <title>Re: kRe: Seeson end reason aged out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79015#M43110</link>
      <description>&lt;P&gt;NAT IP is not applied for this and can packet sent count is 1 can be considered for succeful leaving of firewall?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 13:22:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79015#M43110</guid>
      <dc:creator>KotreshaMC</dc:creator>
      <dc:date>2016-06-02T13:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: kRe: Seeson end reason aged out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79016#M43111</link>
      <description>&lt;P&gt;yes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the SYN packet goes out and then an ACK needs to come back, if the ACK is never returned the session will timeout waiting for reply&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 13:47:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79016#M43111</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-06-02T13:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: kRe: Seeson end reason aged out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79017#M43112</link>
      <description>&lt;P&gt;But i can see IP protocol as UDP, i dont think in this case we receive ACK.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 13:55:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79017#M43112</guid>
      <dc:creator>KotreshaMC</dc:creator>
      <dc:date>2016-06-02T13:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: kRe: Seeson end reason aged out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79020#M43113</link>
      <description>&lt;P&gt;in case of UDP it becomes a little more tricky because there is no ACK, then you will need to rely more on what you see in the pcap from the firewall, the pcap on the final destination and any pcaps you can make in between&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 14:39:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/79020#M43113</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-06-02T14:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: kRe: Seeson end reason aged out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/246141#M70114</link>
      <description>&lt;P&gt;but if you see bytes (not 0). doesn't that mean traffic IS occurring?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jan 2019 20:12:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/246141#M70114</guid>
      <dc:creator>ABlumhard</dc:creator>
      <dc:date>2019-01-15T20:12:30Z</dc:date>
    </item>
    <item>
      <title>Re: kRe: Seeson end reason aged out</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/246159#M70118</link>
      <description>&lt;P&gt;All UDP sessions will show their session end reason as "Aged Out" if the traffic is allowed through the firewall. UDP doesn't have a concept of an explicit close, so if it's not dropped because of a threat or policy deny, "aged out" is the only possible end reason. That much is common, you won't have to worry about that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for the application showing "Insufficient-data", that just means that not enough packets have been seen by the firewall to accurately identify the app itself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Take a look at the session output from the CLI (&lt;FONT face="courier new,courier"&gt;show session id 12345678&lt;/FONT&gt;). You should see the client-to-server (c2s) and reverse (s2c) flows which will show your IPs as well. Check to ensure that the correct NAT addresses (if needed) and make sure that the firewall's routing table (&lt;FONT face="courier new,courier"&gt;show routing route&lt;/FONT&gt;) is correct to be able to route the traffic in both directions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you'd like, paste the result of one of those aged out sessions here. Also, hit the "insert code" icon, you can paste the results in a cleaner format for viewing on these forums, like below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's an example I took from my own firewall that has the same details (IPs changed for privacy). You can see that only 1 packet in each direction was seen, which wasn't enough to identify the application. The end reason is also aged-out, because it's UDP (protocol 17):&lt;/P&gt;&lt;PRE&gt;&amp;gt; show session id 13736

Session           13736

        c2s flow:
                source:      192.168.1.1 [Trust]
                dst:         1.2.3.4
                proto:       17
                sport:       32047           dport:      8814
                state:       INIT            type:       FLOW
                src user:    unknown
                dst user:    unknown
                qos node:    ethernet1/1, qos member N/A Qid 0

        s2c flow:
                source:      1.2.3.4 [Internet]
                dst:         123.222.111.333
                proto:       17
                sport:       8814            dport:      29065
                state:       INIT            type:       FLOW
                src user:    unknown
                dst user:    unknown

        start time                           : Tue Jan 15 13:22:33 2019
        timeout                              : 30 sec
        total byte count(c2s)                : 201
        total byte count(s2c)                : 219
        layer7 packet count(c2s)             : 1
        layer7 packet count(s2c)             : 1
        vsys                                 : vsys1
        application                          : insufficient-data  (insufficient)
        rule                                 : Exclude Logging
        service timeout override(index)      : False
        session to be logged at end          : False
        session in session ager              : False
        session updated by HA peer           : False
        address/port translation             : source
        nat-rule                             : Default Outbound NAT(vsys1)
        layer7 processing                    : enabled
        URL filtering enabled                : True
        URL category                         : any
        session via syn-cookies              : False
        session terminated on host           : False
        session traverses tunnel             : False
        captive portal session               : False
        ingress interface                    : ethernet1/2
        egress interface                     : ethernet1/1
        session QoS rule                     : N/A (class 4)
        end-reason                           : aged-out&lt;/PRE&gt;</description>
      <pubDate>Tue, 15 Jan 2019 21:28:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/seeson-end-reason-aged-out/m-p/246159#M70118</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-01-15T21:28:44Z</dc:date>
    </item>
  </channel>
</rss>

