<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Policy action is  &amp;quot;allow&amp;quot;, but session end reason is &amp;quot;policy-deny&amp;quot; in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165902#M53248</link>
    <description>I have just upfated the other post with the newest TAC reply ... but as this seems to me still like the same issue :&lt;BR /&gt;"The issue is due to a current limitation in identifying session end reasons with SSL code values, which is expected to be fixed in the upcoming maintenance releases (ETA unknown). As of now, the session-end-reason is working as designed and uses the generic "policy-deny" for certain failure condition."</description>
    <pubDate>Tue, 11 Jul 2017 17:53:01 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2017-07-11T17:53:01Z</dc:date>
    <item>
      <title>Security Policy action is  "allow", but session end reason is "policy-deny"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165865#M53242</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;l think l &amp;nbsp;am missing something fundamental. &amp;nbsp;l have a policy with &amp;nbsp;"allow" action, but in the traffic logs&amp;nbsp;session end reason is "policy-deny" :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policy-deny.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10327iEC552EAEB2A8CFD9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="policy-deny.PNG" alt="policy-deny.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Despite all this, l am still able to access the server:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SEC.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10328i653A6FD3751DB056/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="SEC.PNG" alt="SEC.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2017 16:12:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165865#M53242</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-07-11T16:12:10Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy action is  "allow", but session end reason is "policy-deny"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165886#M53243</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37163"&gt;@TranceforLife&lt;/a&gt;&lt;/P&gt;&lt;P&gt;According to this new feature guide, since PAN-OS 6.1 the "policy-deny" reason, is because the session matched a security policy with a deny or drop action.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/61/pan-os/newfeaturesguide/networking-features/session-end-reason-logging" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/61/pan-os/newfeaturesguide/networking-features/session-end-reason-logging&lt;/A&gt;&lt;/P&gt;&lt;P&gt;In other words, the app-id or port being hit, does not match an explicity policy; hence, it is most likely hitting the interzone-default policy.&lt;/P&gt;&lt;P&gt;By the way, the interzone-default policy (at the bottom of the rule base) is not logged by default; however, you can override this configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Default Interzone Policy:&lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Interzone-default-nooverride.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10330iDD77883861D230E2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Interzone-default-nooverride.PNG" alt="Interzone-default-nooverride.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;STRONG&gt;Default Interzone&amp;nbsp;Read-only:&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Interzone-default-nooverride-readonly.PNG" style="width: 702px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10333i21938A75CBF480ED/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Interzone-default-nooverride-readonly.PNG" alt="Interzone-default-nooverride-readonly.PNG" /&gt;&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Default Interzone default action:&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Interzone-default-nooverride1.PNG" style="width: 703px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10334iF756E419FAA8F982/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Interzone-default-nooverride1.PNG" alt="Interzone-default-nooverride1.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN&gt;Override Default Interzone-Policy&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Interzone-default-nooverride.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10335iE4619DD8BE8DF575/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Interzone-default-nooverride.PNG" alt="Interzone-default-nooverride.PNG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Click the Override button at the bottom of the screen&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Change Default&lt;/SPAN&gt;&amp;nbsp;Interzone default action:&lt;/STRONG&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Interzone-default-override-write1.PNG" style="width: 702px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10336i5227BC2B76A7539E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Interzone-default-override-write1.PNG" alt="Interzone-default-override-write1.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;The reason I want to log the session at the start is because the action is "Deny" or "Drop", and I don't care about having the full session view in this case. In other words, as soon as the traffic is denied, a log is generated right away and not only at the end of the session. I hope it makes sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now to your original question, my point is that the policy-deny reason you are seeing is because the app-id or port is not explicitly placed in an allow policy; hence, it will hit the default deny (Interzone) policy, which is not logged by default, as I stated before.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2017 17:01:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165886#M53243</guid>
      <dc:creator>acc6d0b3610eec313831f7900fdbd235</dc:creator>
      <dc:date>2017-07-11T17:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy action is  "allow", but session end reason is "policy-deny"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165890#M53244</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37163"&gt;@TranceforLife&lt;/a&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Are you on 8.0.x or 7.1.x?&lt;/LI&gt;&lt;LI&gt;Do you see these specific logs only with decrypted sessions?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;If you can answer these questions with yes&lt;/P&gt;&lt;P&gt;--&amp;gt; Read my last post in this topic:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/General-Topics/Action-and-Session-End-Reason-conflict-when-SSL-decryption/m-p/163593#M52946" target="_blank"&gt;https://live.paloaltonetworks.com/t5/General-Topics/Action-and-Session-End-Reason-conflict-when-SSL-decryption/m-p/163593#M52946&lt;/A&gt;&lt;/P&gt;&lt;P&gt;(It is at least very likely that you see the same "issue")&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2017 17:23:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165890#M53244</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-07-11T17:23:01Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy action is  "allow", but session end reason is "policy-deny"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165892#M53245</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/36590"&gt;@acc6d0b3610eec313831f7900fdbd235&lt;/a&gt;&amp;nbsp;if the traffic was hitting their interzone-default, wouldn't the log reflect that? &amp;nbsp;It would appear that it is hitting a security rule that they've set up with the name "OUT".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;may be correct in that it is related to the decryption.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've also seen in my testing where SSL is decrypted into "web-browsing" and is then denied because it is going across 443 instead of 80 if the rule was set to application-default. &amp;nbsp;While I'm not suggesting that is happening here (it looks like it is still showing it as SSL traffic), decryptiong seems to add some potential complexity to the security policy design.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2017 17:37:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165892#M53245</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2017-07-11T17:37:23Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy action is  "allow", but session end reason is "policy-deny"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165902#M53248</link>
      <description>I have just upfated the other post with the newest TAC reply ... but as this seems to me still like the same issue :&lt;BR /&gt;"The issue is due to a current limitation in identifying session end reasons with SSL code values, which is expected to be fixed in the upcoming maintenance releases (ETA unknown). As of now, the session-end-reason is working as designed and uses the generic "policy-deny" for certain failure condition."</description>
      <pubDate>Tue, 11 Jul 2017 17:53:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165902#M53248</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-07-11T17:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy action is  "allow", but session end reason is "policy-deny"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165924#M53249</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/39461"&gt;@jsalmans&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;There is a lengthy on-going discussion on how to properly address the 'web-browsing' issue when using SSL decryption. As of Ignite17 to recommended soution is still to enable a browsing rule with web-browsing using a specified tcp-443/80 service instead of application-default.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2017 19:17:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165924#M53249</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-07-11T19:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy action is  "allow", but session end reason is "policy-deny"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165960#M53251</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;for all your input.&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;yes 8.0.3 and yes exactly the same issue as yours (initially I thought l missed&amp;nbsp;some fundamentals :D)&lt;/P&gt;&lt;P&gt;Kudos for all replies!!&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2017 22:05:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/165960#M53251</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-07-11T22:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy action is  "allow", but session end reason is "policy-deny"</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/550960#M112265</link>
      <description>&lt;P&gt;I just had to figure out an issue with an allow rule that was doing policy-deny.&amp;nbsp; It turned out to be an Authentication Policy rule configured with Authentication Enforcement value "default-web-form".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wasn't able to find this in the traffic logs, as we were logging at session end and I guess it didn't consider my sessions to have started.&amp;nbsp; But it did show in the Session Browser.&amp;nbsp; ICMP packets mentioned below did show up in traffic logs though!&amp;nbsp; Very confusing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More info to help future me and others:&lt;/P&gt;
&lt;P&gt;PAN-OS 10.2.4-h2&lt;/P&gt;
&lt;P&gt;The firewall does the default-web-form (redirect?) action by generating a packet out of thin air: UDP to port 4501, source being the server, destination being the client device, containing the URL to the Auth Portal in the packet data.&amp;nbsp; My test clients were not listening on port 4501 so responded with ICMP port unreachable messages to the server.&amp;nbsp; Very odd to see in packet captures.&amp;nbsp; I suppose a client running GlobalProtect may be listening on port 4501?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BTW the URL that it sends ends with rule=2 (or some number) which refers to which Auth Policy rule is causing this.&amp;nbsp; It is zero-indexed so rule=2 means rule 3 in the GUI.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 21:19:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-policy-action-is-quot-allow-quot-but-session-end-reason/m-p/550960#M112265</guid>
      <dc:creator>AaronAxvig</dc:creator>
      <dc:date>2023-07-25T21:19:53Z</dc:date>
    </item>
  </channel>
</rss>

