<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: UDP log that hit any deny rule and show allow in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/udp-log-that-hit-any-deny-rule-and-show-allow/m-p/218158#M63070</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/91319"&gt;@hbshin&lt;/a&gt;&lt;/P&gt;&lt;P&gt;It could be exactly the same behaviour as described in the article you mentionned as the applications in your screenshot are also analysed with a decoder. When you enable the start log or even better with a flow basic analysis you probably find out more about this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But besides this behaviour with allow logs for a deny rule. From your screenshot it looks like your trust zone has private IP addresses (RFC1918), so may I ask you why you have a rule allowing ping, icmp and traceroute from the internet towards your internal network?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And: do you still have these "allowed"-deny-logs when you set the service in rule 34 to application-default?&lt;/P&gt;</description>
    <pubDate>Sun, 17 Jun 2018 17:01:55 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-06-17T17:01:55Z</dc:date>
    <item>
      <title>UDP log that hit any deny rule and show allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-log-that-hit-any-deny-rule-and-show-allow/m-p/218113#M63053</link>
      <description>&lt;P&gt;Hello, i have a question about UDP session&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;rule 34&lt;/P&gt;&lt;P&gt;untrust any&lt;/P&gt;&lt;P&gt;trust any&lt;/P&gt;&lt;P&gt;app icmp, traceroute, ping&lt;/P&gt;&lt;P&gt;service &lt;STRONG&gt;any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;action allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;rule 214&lt;/P&gt;&lt;P&gt;any any deny&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="20180616_111325.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/15512i11FB7853134A9445/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="20180616_111325.png" alt="20180616_111325.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you can see &lt;STRONG&gt;allow&lt;/STRONG&gt; log hit rule 214&lt;/P&gt;&lt;P&gt;i found similar case about tcp.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Action-Configured-in-Security-Rules-and-Seen-in-Traffic-Log-is/ta-p/62785" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/Action-Configured-in-Security-Rules-and-Seen-in-Traffic-Log-is/ta-p/62785&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i think UDP session was created hitting rule 34&amp;nbsp;but don't understand UDP log showing allow and hit rule 214&lt;/P&gt;&lt;P&gt;Could you explain this log?&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Sat, 16 Jun 2018 02:21:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-log-that-hit-any-deny-rule-and-show-allow/m-p/218113#M63053</guid>
      <dc:creator>hbshin</dc:creator>
      <dc:date>2018-06-16T02:21:27Z</dc:date>
    </item>
    <item>
      <title>Re: UDP log that hit any deny rule and show allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-log-that-hit-any-deny-rule-and-show-allow/m-p/218137#M63061</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/91319"&gt;@hbshin&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;It might help if you expand one of the sessions so that we can actually see what happened. Just the log doesn't really tell anyone much, but it likely has to do with the fact that you are allowing icmp, traceroute, and ping on service any with an action of allow. My guess would be that if you look at the actual session you'll see something a little different than what the base log is showing in your traffic logs. -&lt;/P&gt;</description>
      <pubDate>Sun, 17 Jun 2018 04:51:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-log-that-hit-any-deny-rule-and-show-allow/m-p/218137#M63061</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-06-17T04:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: UDP log that hit any deny rule and show allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-log-that-hit-any-deny-rule-and-show-allow/m-p/218158#M63070</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/91319"&gt;@hbshin&lt;/a&gt;&lt;/P&gt;&lt;P&gt;It could be exactly the same behaviour as described in the article you mentionned as the applications in your screenshot are also analysed with a decoder. When you enable the start log or even better with a flow basic analysis you probably find out more about this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But besides this behaviour with allow logs for a deny rule. From your screenshot it looks like your trust zone has private IP addresses (RFC1918), so may I ask you why you have a rule allowing ping, icmp and traceroute from the internet towards your internal network?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And: do you still have these "allowed"-deny-logs when you set the service in rule 34 to application-default?&lt;/P&gt;</description>
      <pubDate>Sun, 17 Jun 2018 17:01:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-log-that-hit-any-deny-rule-and-show-allow/m-p/218158#M63070</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-06-17T17:01:55Z</dc:date>
    </item>
    <item>
      <title>Re: UDP log that hit any deny rule and show allow</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/udp-log-that-hit-any-deny-rule-and-show-allow/m-p/218162#M63074</link>
      <description>&lt;P&gt;Hello, &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;why you have a rule allowing ping, icmp and traceroute from the internet towards your internal network?&lt;/P&gt;&lt;P&gt;- it replaced old checkpoint firewall&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And: do you still have these "allowed"-deny-logs when you set the service in rule 34 to application-default?&lt;/P&gt;&lt;P&gt;- There&amp;nbsp;is no allowed log in rule 214 after set the service in rule 34 to application-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when allowed log created i was doing HA A-P Failover test.&lt;/P&gt;&lt;P&gt;There was&amp;nbsp;always&amp;nbsp;System log that HA state change from passive to active between Start time and&amp;nbsp;Receive&amp;nbsp;time in allowed log&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In other words, i think allowed log&amp;nbsp;session was started&amp;nbsp;on peer.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Best regards.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Jun 2018 18:02:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/udp-log-that-hit-any-deny-rule-and-show-allow/m-p/218162#M63074</guid>
      <dc:creator>hbshin</dc:creator>
      <dc:date>2018-06-17T18:02:25Z</dc:date>
    </item>
  </channel>
</rss>

