<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tail traffic in CLI? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tail-traffic-in-cli/m-p/196506#M58520</link>
    <description>&lt;P&gt;Hm... That's a little unfortunate.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thank you!&lt;/P&gt;</description>
    <pubDate>Tue, 23 Jan 2018 20:55:16 GMT</pubDate>
    <dc:creator>Gareth.Doyle</dc:creator>
    <dc:date>2018-01-23T20:55:16Z</dc:date>
    <item>
      <title>Tail traffic in CLI?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tail-traffic-in-cli/m-p/196304#M58488</link>
      <description>&lt;P&gt;Is it possible to tail live traffic in the CLI while running a grep (or match) for specific things? I would find this extremely useful..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 00:55:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tail-traffic-in-cli/m-p/196304#M58488</guid>
      <dc:creator>Gareth.Doyle</dc:creator>
      <dc:date>2018-01-23T00:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: Tail traffic in CLI?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tail-traffic-in-cli/m-p/196372#M58492</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80358"&gt;@Gareth.Doyle&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes and no: there are several ways, depending on what you want to know, to look for/at sessions/session details, but there is no 'follow'' function to see one particular session&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can &lt;FONT face="terminal,monaco"&gt;&amp;gt;show session all filter&lt;/FONT&gt;&amp;nbsp; to find all sessions matchingsomething specific (application, port, ip,..)&lt;/P&gt;
&lt;PRE&gt;admin@MyFirewall&amp;gt; show session all filter 
+ application         Application name
+ count               count number of sessions only
+ destination         destination IP address
+ destination-port    Destination port
+ destination-user    Destination user
+ egress-interface    egress interface
+ from                From zone
+ hw-interface        hardware interface
+ ingress-interface   ingress interface
+ min-kb              minimum KB of byte count
+ nat                 If session is NAT
+ nat-rule            NAT rule name
+ pbf-rule            Policy-Based-Forwarding rule name
+ protocol            IP protocol value
+ qos-class           QoS class
+ qos-node-id         QoS node-id value
+ qos-rule            QoS rule name
+ rematch             rematch sessions
+ rule                Security rule name
+ source              source IP address
+ source-port         Source port
+ source-user         Source user
+ ssl-decrypt         session is decrypted
+ start-at            Show next 1K sessions
+ state               flow state
+ to                  To zone
+ tunnel-decap        session is outer tunnel with inspection enabled
+ tunnel-inspected    session is inside tunnel
+ type                flow type
  |                   Pipe through a command
  &amp;lt;Enter&amp;gt;             Finish input


&lt;/PRE&gt;
&lt;P&gt;or you can &lt;FONT face="terminal,monaco"&gt;&amp;gt;show session id&lt;/FONT&gt; which will show you the stats of one specific session&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;admin@MyFirewall&amp;gt; show session id 26709

Session           26709

        c2s flow:
                source:      192.168.0.97 [v1-trust]
                dst:         4.2.2.2
                proto:       17
                sport:       61263           dport:      53
                state:       INIT            type:       FLOW
                src user:    unknown
                dst user:    unknown

        s2c flow:
                source:      4.2.2.2 [v1-untrust]
                dst:         198.51.100.241
                proto:       17
                sport:       53              dport:      27792
                state:       INIT            type:       FLOW
                src user:    unknown
                dst user:    unknown

        start time                           : Tue Jan 23 11:36:42 2018
        timeout                              : 30 sec
        total byte count(c2s)                : 211
        total byte count(s2c)                : 271
        layer7 packet count(c2s)             : 2
        layer7 packet count(s2c)             : 1
        vsys                                 : vsys1
        application                          : dns  
        rule                                 : dns
        session to be logged at end          : False
        session in session ager              : False
        session updated by HA peer           : False
        address/port translation             : source
        nat-rule                             : hideNAT-ISP1(vsys1)
        layer7 processing                    : enabled
        URL filtering enabled                : False
        session via syn-cookies              : False
        session terminated on host           : False
        session traverses tunnel             : False
        captive portal session               : False
        ingress interface                    : ethernet1/2
        egress interface                     : ethernet1/1
        session QoS rule                     : N/A (class 4)
        end-reason                           : aged-out
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 10:39:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tail-traffic-in-cli/m-p/196372#M58492</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-23T10:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: Tail traffic in CLI?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tail-traffic-in-cli/m-p/196506#M58520</link>
      <description>&lt;P&gt;Hm... That's a little unfortunate.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 20:55:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tail-traffic-in-cli/m-p/196506#M58520</guid>
      <dc:creator>Gareth.Doyle</dc:creator>
      <dc:date>2018-01-23T20:55:16Z</dc:date>
    </item>
  </channel>
</rss>

