<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Action and Session End Reason conflict when SSL decryption enabled in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/161972#M52623</link>
    <description>&lt;P&gt;I could be wrong, but to me it looks like this is normal. &amp;nbsp;This is why I think so:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You're getting an "allow" because it's matching a layer 3 / 4 "allow" but then if you were to look at the magnifying glass you'd see a deny type log (for Layer 7 controls) but the details of those specific logs would help clarify more as to what exactly was going on.&lt;/P&gt;</description>
    <pubDate>Mon, 19 Jun 2017 15:14:19 GMT</pubDate>
    <dc:creator>Brandon_Wertz</dc:creator>
    <dc:date>2017-06-19T15:14:19Z</dc:date>
    <item>
      <title>Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/161963#M52620</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SSL decryption was turned on for one of the inside servers. Although it looks good, but some of the logs are rather strange.&lt;/P&gt;&lt;P&gt;There are sessions like these:&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="session1.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9807iD6EBD7668140DE34/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="session1.png" alt="session1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Basically &amp;nbsp;Action - Allow, Rule is hitting correct one (the one permitting the traffic), but Type is Deny and Session End Reason is policy-deny. That looks false to me and it seems that traffic is permitted indeed. Can check more with captures, etc., but has anyone seen such an effect?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;PAN-OS: 8.0.2&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 15:03:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/161963#M52620</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2017-06-19T15:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/161972#M52623</link>
      <description>&lt;P&gt;I could be wrong, but to me it looks like this is normal. &amp;nbsp;This is why I think so:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You're getting an "allow" because it's matching a layer 3 / 4 "allow" but then if you were to look at the magnifying glass you'd see a deny type log (for Layer 7 controls) but the details of those specific logs would help clarify more as to what exactly was going on.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 15:14:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/161972#M52623</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2017-06-19T15:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/161976#M52626</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42773"&gt;@nikoo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Does this eventually shift away from SSL and into a more specifc app-id. One thing to keep in mind as well is that your traffic could be attempting to shift to 'web-browsing' and if you have your service set as 'application default' obviously web-browsing no-longer matches your rule. Without knowing the detailed logs or what your policy actually looks like I wouldn't be able to say for certain.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 15:19:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/161976#M52626</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-06-19T15:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/161984#M52629</link>
      <description>&lt;P&gt;Today we also found a lot of these entries on our firewall. The strange thing is: its exacly this log entry as on the screenshot from &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42773"&gt;@nikoo&lt;/a&gt;, no url log, no threat log ... nothing. Only this type deny log with the action allow and the session end reason policy deny&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit: I have now seen these logs on 3 different hardware series running 8.0.2. So the only thing I know, it is not hardware related&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 15:39:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/161984#M52629</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-06-19T15:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/161997#M52632</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42773"&gt;@nikoo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Could you guys post your dynamic update versions so we can see if any of those match. It sounds like you'll both likely want to open a Tac case or reach out to your SE to pass along the infromation, but if we could find any additional common ground that may be shared other than simply 8.0.2 that would be great. I imagine that while 8.0.2 is a shared trait if it was specific to that software version by itself the issue would have already presented itself.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 15:45:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/161997#M52632</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-06-19T15:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/161999#M52633</link>
      <description>&lt;P&gt;I'm running 5060s on 7.1.8:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;BR /&gt;Application Version 709-4078 (06/13/17)&lt;/P&gt;&lt;P&gt;Threat Version 709-4078 (06/13/17)&lt;/P&gt;&lt;P&gt;Antivirus Version 2279-2767 (06/19/17)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I saw the same type logs on my FW. &amp;nbsp;I think the this might be "normal" as described by my comment above. &amp;nbsp;Maybe not though, unless some can refute my assumptions?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 16:05:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/161999#M52633</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2017-06-19T16:05:19Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/162002#M52636</link>
      <description>&lt;P&gt;2 cluster have the same versions mentionned by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt; installed and 1 cluster has app&amp;amp;threat 708-4066 and av version 2278-2766 installed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Of coulse it could be absolutely normal ... but when I read the first post on this topic and then checked my logs I thought there should be another log (url/threat) which indicates the reason of this "policy deny"&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 16:16:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/162002#M52636</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-06-19T16:16:02Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/162007#M52639</link>
      <description>&lt;P&gt;Here's a detailed log view from one session on my FW&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Traffic_Log.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9808iBC17B7431B3135C9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Traffic_Log.PNG" alt="Traffic_Log.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 16:35:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/162007#M52639</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2017-06-19T16:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/162008#M52640</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Thats how I was expecting the log should look like. But at least on 8.0.2 other logs exept the traffictype:deny-action:allow are missing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit: One cluster was updated on saturday from 7.0.x to 8.0.2. Since then it started with these missing logs. On 7.0.x I haven't had such logs at all with these type/action/session-end-reason --&amp;gt; So it could be a bug of 8.0.2&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 16:56:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/162008#M52640</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-06-19T16:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/162160#M52656</link>
      <description>&lt;P&gt;Had to run home yesterday, so didn't elaborate much on details. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; But, yea, there are no additional inspection events related to that specific event&amp;nbsp;- just a one rule hit, which covers all of the possible variations for application shifts on that TCP/443 port, without using application-default behavior. These logs definitely showed up only after enabling SSL decryption for that specific inside server and dissapeared after disabling it, so that may be related to some application shifts happing somewhere under the hood or some inspection profile having some impact.&lt;/P&gt;&lt;P&gt;Here's a sanitized full log entry:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="session2.png" style="width: 564px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9822iCD63595C104D709E/image-dimensions/564x467/is-moderation-mode/true?v=v2" width="564" height="467" role="button" title="session2.png" alt="session2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And here's a rule:&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="rule1.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9820i7F585E252BA6A6B2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="rule1.png" alt="rule1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;There are some inspection profiles attached to it, so there is an option to disable them and see if that has any impact on the logs. At the moment decryption is disabled though, so cannot test that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;8.0.3 is out - I don't see anything related in the fixed bug section though, but may worth&amp;nbsp;trying.&lt;/P&gt;&lt;P&gt;Cannot tell about 7.0.x or 7.1.x, because had to upgrade to 8.0.x in order to have Inbound SSL decryption for ECDHE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sitting on 708-4066.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 06:41:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/162160#M52656</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2017-06-20T06:41:05Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/162170#M52657</link>
      <description>&lt;P&gt;I've opened a TAC case to find out what's going wrong here. Will get back with an update as soon I have new informations.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 06:55:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/162170#M52657</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-06-20T06:55:56Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/163340#M52893</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;Hi, did you get any feedback from TAC?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 08:16:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/163340#M52893</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2017-06-27T08:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/163343#M52894</link>
      <description>&lt;P&gt;hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42773"&gt;@nikoo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately no useful result so far ...&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2017 08:40:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/163343#M52894</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-06-27T08:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/163593#M52946</link>
      <description>&lt;P&gt;FYI: These logentries are ALL because of decryption errors. In PAN-OS 8 mostly because of client certificates as almost anything else should be decrypted by default. Support is now verifying if it is "expected behaviour" that this "special" decryption-error is shown as "policy-deny" or if this a bug and the log is expected to show "decryption-error".&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2017 11:03:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/163593#M52946</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-06-28T11:03:54Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/165901#M53247</link>
      <description>FYI: "The issue is due to a current limitation in identifying session end reasons with SSL code values, which is expected to be fixed in the upcoming maintenance releases (ETA unknown). As of now, the session-end-reason is working as designed and uses the generic "policy-deny" for certain failure condition."</description>
      <pubDate>Tue, 11 Jul 2017 17:50:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/165901#M53247</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-07-11T17:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/209231#M61186</link>
      <description>&lt;P&gt;In my case, that kind of log appears at least when the browser shows the typical message about untrusted certificate. Is this your case?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Apr 2018 11:08:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/209231#M61186</guid>
      <dc:creator>ACortes</dc:creator>
      <dc:date>2018-04-09T11:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: Action and Session End Reason conflict when SSL decryption enabled</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/537951#M110468</link>
      <description>&lt;P&gt;is there any eta when it will be fixed, as this conflicts with my dynamic no-ssl-decrypt groups, the policy works and the traffic is marked and supposed to be bypassed for decryption but it hits the allow policy but "end reason - policy deny"&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2023 04:20:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/action-and-session-end-reason-conflict-when-ssl-decryption/m-p/537951#M110468</guid>
      <dc:creator>nevolex</dc:creator>
      <dc:date>2023-04-07T04:20:08Z</dc:date>
    </item>
  </channel>
</rss>

