<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New PA user and currently concerned in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168250#M53635</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am a new PA user, purchased a pa-850 and 2 x PA5220's&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adding these to my OSPF network, i have setup a policy "network protocols" that allows OSPF.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But for some reason in my log, I get OSPF time out session and aged out sessions and sessions that have 0 bytes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I contact support. &amp;nbsp;after 2-3 weeks, they bring it up in their lab and I am told this is normal behaviour.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If its normal why do they need to lab it up, it should be in the documentation yes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also for a next gen FW that doesn't understand OSPF, wow...... I am really reconsidering my choice in PA...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So is this standard for OSPF connections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To be clear I believe the OSPF connection is okay, atleast from my other routers point of view, its just the way that the PA are logging it, I believe I haven't as yet put them into any situation where they could cause a problem ...&lt;/P&gt;</description>
    <pubDate>Tue, 25 Jul 2017 21:52:54 GMT</pubDate>
    <dc:creator>Alex_Samad</dc:creator>
    <dc:date>2017-07-25T21:52:54Z</dc:date>
    <item>
      <title>New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168250#M53635</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am a new PA user, purchased a pa-850 and 2 x PA5220's&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adding these to my OSPF network, i have setup a policy "network protocols" that allows OSPF.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But for some reason in my log, I get OSPF time out session and aged out sessions and sessions that have 0 bytes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I contact support. &amp;nbsp;after 2-3 weeks, they bring it up in their lab and I am told this is normal behaviour.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If its normal why do they need to lab it up, it should be in the documentation yes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also for a next gen FW that doesn't understand OSPF, wow...... I am really reconsidering my choice in PA...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So is this standard for OSPF connections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To be clear I believe the OSPF connection is okay, atleast from my other routers point of view, its just the way that the PA are logging it, I believe I haven't as yet put them into any situation where they could cause a problem ...&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2017 21:52:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168250#M53635</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-07-25T21:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168333#M53645</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Aged-out is fine because OSPF doesn't use TCP, it is standalone (own) protocol. Can you please post detailed (magnifying glass) log view.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jul 2017 06:58:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168333#M53645</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-07-26T06:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168335#M53646</link>
      <description>&lt;P&gt;Also if you will check session browser tab, and filter based on the&amp;nbsp;OSFP app, what can you see. I think it is something to do with the device own session. For instance, l am running an IPSec VPN that terminates on the PA, l also cannot clear this session as well as my counters 0 bytes:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="esp.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10518i02FDFC10E2C27314/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="esp.JPG" alt="esp.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDIT: &lt;SPAN&gt;I'm not sure, though, if this is the case with OSPF&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jul 2017 08:42:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168335#M53646</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-07-26T08:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168709#M53678</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'm guessing that you worked soley with level 1 TAC, which will take a while to actually accomplish much of anything and likely weren't familiar with OSPF installations. I would recommend you only let front-line support hold a case for a day, after that tell them to hand you up a tier. Personal experiance has told me that the first person you are going to get into touch with through TAC isn't going to know much about the product. Don't get me wrong, some of those guys actually are great, but Palo Alto has had to grow that team so much that a lot of them are quickly moved into tier 2 and tier 3 roles and then get passed off to other departments; sadly this means that tier 1 has decreased in recent years in their knowledge of the product.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The good news is from talking with plenty of people internal to the company they are desperatly trying to stop the tier 1 hemorage of knowledge. So they are at least trying to address the issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jul 2017 15:59:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168709#M53678</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-07-27T15:59:17Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168729#M53683</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;It is possible to force a TAC case to be moved to level 2 or 3 after one day? Do you simply need to say "please move the case to the next level" or how does this has to be done? Over your SE?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jul 2017 18:40:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168729#M53683</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-07-27T18:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168731#M53684</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I wouldn't say it's as simple as saying 'please move the case to the next level' but more of an 'I think this needs to go to the next level, I think this is above your head' type of thing. I haven't had anybody say no at this point, although I have had to repeat it with a little more force to get the point across. I'm not sure what TACs actual protocol is to escalate a case.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wouldn't do this for a simple question after only a day but if it stretches out to a few days, or better yet it actually effects my users, I'm getting escalated one way or another. I'm not sure how TAC is actually graded as far as the individual is concerned, but I've connected with a few TAC techs that wanted to hold onto a case for far to long before I actually brought up escalating directly with them.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jul 2017 18:46:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168731#M53684</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-07-27T18:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168746#M53687</link>
      <description>&lt;P&gt;I usually ask through&amp;nbsp;the portal: Please, can we escalate this case :D.&lt;/P&gt;&lt;P&gt;But again it all depends on the actual issue&amp;nbsp;and if you think that the conclusion was wrong or you need a bit more info, you can escalate. Most of the time, 98%, engineers are very good (EMEA TAC). 1,5 year working in the support I did escalate only twice.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jul 2017 20:47:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168746#M53687</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-07-27T20:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168755#M53696</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37163"&gt;@TranceforLife&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You said the magic words of EMEA though &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jul 2017 21:10:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168755#M53696</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-07-27T21:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168756#M53697</link>
      <description>&lt;P&gt;Not sure where are you based (guess US), but US TAC didn't show me a good example of the support.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jul 2017 21:12:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168756#M53697</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-07-27T21:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168766#M53700</link>
      <description>&lt;P&gt;My current experience hasn't been the best.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OSPF - OKay I can accept that the Firewall can't undersstand OSPF in regards to policies - that seems like a major defect to me. &amp;nbsp;Why do I pay so much for a system that ....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as for support - I have had a Global Protect issue, that I have asked to be escaled - 3 or 4 times and I am still stuck with the same person. &amp;nbsp;Not getting any where.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this had happened during my POC, I would have looked else where.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have had some good experiences.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But a lot of them the web ex session are people randomly clicking on things, lets try this and see what happens and then lets try this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure if it makes me feel better to hear others are having same issues or worse !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jul 2017 22:57:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168766#M53700</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-07-27T22:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168849#M53710</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If your not being escalated when your asking I would ask to speak with their manager; additionally bring your SE and your account manager into the mix. In my experiance you won't get good GlobalProtect support until you get escalated. Tier 1 can get really frustrating to deal with at times, especially when they want to commit something while I already have other changes pending or want to make a major adjustment during the middle of the day.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jul 2017 12:52:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168849#M53710</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-07-28T12:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168851#M53711</link>
      <description>&lt;P&gt;Wow. I cannot believe this is all done or can be done by Palo TAC...............&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jul 2017 12:53:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168851#M53711</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-07-28T12:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168878#M53724</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37163"&gt;@TranceforLife&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;From what I've been told from fellow PA users EMEA TAC is a completely different experiance and generally much better then what we currently see stateside.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jul 2017 14:56:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168878#M53724</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-07-28T14:56:39Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168972#M53743</link>
      <description>&lt;P&gt;Wow , good and bad to hear I guess&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tried the escaltion path again&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jul 2017 01:36:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/168972#M53743</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-07-30T01:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/169400#M53825</link>
      <description>&lt;P&gt;OSPF doesn't get logged as traffic, as it happens outside (or, maybe "below") the scope of the firewall engine. &amp;nbsp;This is all handled in the routing functions, which happen before traffic reaches the firewall engine. &amp;nbsp;However, it does get logged under System, where you can filter on "ospf", to see what it's doing. &amp;nbsp;Monitor tab --&amp;gt; System. &amp;nbsp;And there's CLI commands that can be run to display all kinds of OSPF info.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This tripped us up last week when we implemented our first OSPF setup from scratch, and nothing worked. &amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &amp;nbsp;There's a lot of dialogs, sub-dialogs, and checkboxes that need to be filled in correctly before it all starts to work. &amp;nbsp;And multiple different places that interfaces need to be associated with the OSPF stuff. &amp;nbsp;But, the logs are there, and once you figure out where the information is stored in the Virtual Router configuration, it does start to make sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've never used an actual routing protocol before, and I was able to get a PA-200 talking to a PA-3020 via OSPF, distributing it's IPs and subnets successfully across our internal fibre network and across our Telus MPLS links to remote PA firewalls. &amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One thing I've noticed with PA firewalls is that "the normal way" of thinking about firewalls and routing doesn't really apply. &amp;nbsp;But once you wrap your head around "the PA way" of thinking, it all starts to make a lot of sense. &amp;nbsp;We came from a FreeBSD firewall / router setup, with some Linux firewalls mixed in (so all layer 2/3 filtering) and found the PA firewalls to be a pain to work with initially. &amp;nbsp;But, once we moved away from the strict-L3 packet filtering mindset, we figured out how to make the most of the features offered. &amp;nbsp;Now, if only they'd drop the price ... &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 20:44:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/169400#M53825</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2017-08-01T20:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/169414#M53828</link>
      <description>&lt;P&gt;I have to dissagree, I am seeing OSPF traffic in my traffic log, which is why I brought it to the tac attention.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I get that the PA is different, but I would presume that a next gen system, that has all this smarts in it would atleast understand the OSPF protocol.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A session should easily be follow, the OSPF deamon seems to be able to do it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Having said that, the OSPF network does seem to be stable my adjancy stats show long periods of time.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 21:36:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/169414#M53828</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-08-01T21:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/169419#M53829</link>
      <description>&lt;P&gt;Where/how are you seeing OSPF entries&amp;nbsp;in the Traffic log? &amp;nbsp;Do you have Security Policies in place to allow OSPF traffic, or something?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All of our PA firewalls are confgured to use OSPF for routing, but none of them have Security Policies for allowing OSPF traffic (with default deny enabled), and none of them show OSPF entries in the Traffic log. &amp;nbsp;The only entries are in the System log.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're running PanOS 6.1.x, so things may be different in newer versions.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 22:38:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/169419#M53829</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2017-08-01T22:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/169423#M53831</link>
      <description>&lt;P&gt;Yes I do have policies in place..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thats interesting, i could see that happening.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I need to test this some how... sigh..&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 23:12:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/169423#M53831</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-08-01T23:12:15Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/169941#M53955</link>
      <description>&lt;P&gt;So i tested and when i removed the policies it stop the OSPF from creating neighour association with the other routers&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2017 20:43:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/169941#M53955</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-08-03T20:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: New PA user and currently concerned</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/169951#M53957</link>
      <description>&lt;P&gt;Palo Alto Networks firewalls have 2 implicit/default security rules that are always at the end of the policy. &amp;nbsp;In recent PAN-OS versions, they are highlighted in yellow and can be modified. &amp;nbsp;In older PAN-OS versions, they are not visible. &amp;nbsp;In all cases, their behavior can be overridden by&amp;nbsp;adding explicit firewall rules above. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="default-rules.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10630iEA6B7C57D084F891/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="default-rules.png" alt="default-rules.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;the default intrazone-default rule permits traffic within the same zone, without logging or security profiles. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;intrazone means "within the same zone". &amp;nbsp;This rule permits "trust" to "trust" traffic. &amp;nbsp;If you're running OSPF on the inside of your network, and the firewall is participating in OSPF, the source of the OSPF traffic is trust, and the destination is also trust. &amp;nbsp;This traffic matches the intrazone-default rule WITHOUT LOGGING. &amp;nbsp;So if you're running OSPF and not seeing logs, that's why. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you'd like to see logs for OSPF traffic, you have a few choices:&lt;/P&gt;&lt;P&gt;&amp;nbsp;1.) create an explicit security policy that permits OSPF from trust to trust, with logging. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;2.) create an explicit security policy that permits all trust to trust, with logging&lt;/P&gt;&lt;P&gt;&amp;nbsp;3.) modify the implicit/default intrazone policy and enable logging.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The last rule is the interzone-default rule, which means "between different zones". &amp;nbsp;This rule denies all traffic between zones, without logging. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your 3rd-to-last security rule is "deny any any with logging", that will override both of the implicit/default rules. &amp;nbsp;This breaks&amp;nbsp;OSPF, BGP, IPSEC, SSLVPN, Captive Portal, etc. &amp;nbsp;and anything else that is to/from the same zone. &amp;nbsp;I believe this is the main reason why Palo Alto Networks made those implicit rules visible and&amp;nbsp;editable.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2017 21:26:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-pa-user-and-currently-concerned/m-p/169951#M53957</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2017-08-03T21:26:46Z</dc:date>
    </item>
  </channel>
</rss>

