<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ipsec-esp / Protocol 50 invisible in vwire mode ? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-protocol-50-invisible-in-vwire-mode/m-p/9260#M6778</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is possible that the traffic for the ipsec-udp is minimal and the criteria you have set it does not show in that.&lt;/P&gt;&lt;P&gt;Also keep in mind the data is logged at the session end. &lt;/P&gt;&lt;P&gt;Verify that the setting are expanded as per need for Time, sort by and top&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Capture.JPG.jpg" class="jive-image" height="230" src="https://live.paloaltonetworks.com/legacyfs/online/7996_Capture.JPG.jpg" style="height: 231px; width: 1068.8059701492537px;" width="1067" /&gt;&lt;/P&gt;&lt;P&gt;Also anther thing you can do is check in the traffic logs to verify if you have logs for it by using the filter.&lt;/P&gt;&lt;P&gt;You can use following filter ( app eq ipsec-esp-udp ) and ( app eq ipsec-esp )&lt;/P&gt;&lt;P&gt;If nothing shows up here then do it based on the traffic rule e.g ( rule eq rule_name )&lt;/P&gt;&lt;P&gt;If the traffic shows up now. Then verify what is the application it is showing. If it is showing up undecided or the actual applicaiton name.&lt;/P&gt;&lt;P&gt;If it is showing up as actual application name then as mentioned above it is just possible that you have minimal traffic for it and it is just now showing up in ACC tab.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;BR /&gt;Thanks&lt;/P&gt;&lt;P&gt;Numan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 Aug 2013 18:31:05 GMT</pubDate>
    <dc:creator>mbutt</dc:creator>
    <dc:date>2013-08-29T18:31:05Z</dc:date>
    <item>
      <title>ipsec-esp / Protocol 50 invisible in vwire mode ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-protocol-50-invisible-in-vwire-mode/m-p/9256#M6774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have a Vwire configuration with a paloalto (5.0.6) between a third-party router and the wan port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security policy is allow any - any for both directions/security zones, log at session start an end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything works (as expected), all VPN Tunnels on the third party device are up and running, b&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;ut we dont see any ipsec-esp traffic in the traffic monitor, or ACC stats.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;If we make a packet capture on the paloalto we do see that the ipsec-esp packets are passing through the vwire.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We already tried du define two additional rules with ipsec as application - but that does not change anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any hints ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Aug 2013 15:01:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-protocol-50-invisible-in-vwire-mode/m-p/9256#M6774</guid>
      <dc:creator>register</dc:creator>
      <dc:date>2013-08-27T15:01:10Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec-esp / Protocol 50 invisible in vwire mode ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-protocol-50-invisible-in-vwire-mode/m-p/9257#M6775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are we able to see live sessions on the the paloalto for protocol 50?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command to check that would be:&lt;/P&gt;&lt;P&gt;&amp;gt; show session all filter protocol 50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Aug 2013 18:29:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-protocol-50-invisible-in-vwire-mode/m-p/9257#M6775</guid>
      <dc:creator>kadak</dc:creator>
      <dc:date>2013-08-27T18:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec-esp / Protocol 50 invisible in vwire mode ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-protocol-50-invisible-in-vwire-mode/m-p/9258#M6776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes, we do see them.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Aug 2013 06:51:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-protocol-50-invisible-in-vwire-mode/m-p/9258#M6776</guid>
      <dc:creator>register</dc:creator>
      <dc:date>2013-08-28T06:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec-esp / Protocol 50 invisible in vwire mode ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-protocol-50-invisible-in-vwire-mode/m-p/9259#M6777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you paste the o/p of the following commands:-&lt;/P&gt;&lt;P&gt;debug log-receiver statistics&lt;/P&gt;&lt;P&gt; show system logdb-quota&lt;/P&gt;&lt;P&gt; show system disk-space&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 18:22:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-protocol-50-invisible-in-vwire-mode/m-p/9259#M6777</guid>
      <dc:creator>sraghunandan</dc:creator>
      <dc:date>2013-08-29T18:22:01Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec-esp / Protocol 50 invisible in vwire mode ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-protocol-50-invisible-in-vwire-mode/m-p/9260#M6778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is possible that the traffic for the ipsec-udp is minimal and the criteria you have set it does not show in that.&lt;/P&gt;&lt;P&gt;Also keep in mind the data is logged at the session end. &lt;/P&gt;&lt;P&gt;Verify that the setting are expanded as per need for Time, sort by and top&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Capture.JPG.jpg" class="jive-image" height="230" src="https://live.paloaltonetworks.com/legacyfs/online/7996_Capture.JPG.jpg" style="height: 231px; width: 1068.8059701492537px;" width="1067" /&gt;&lt;/P&gt;&lt;P&gt;Also anther thing you can do is check in the traffic logs to verify if you have logs for it by using the filter.&lt;/P&gt;&lt;P&gt;You can use following filter ( app eq ipsec-esp-udp ) and ( app eq ipsec-esp )&lt;/P&gt;&lt;P&gt;If nothing shows up here then do it based on the traffic rule e.g ( rule eq rule_name )&lt;/P&gt;&lt;P&gt;If the traffic shows up now. Then verify what is the application it is showing. If it is showing up undecided or the actual applicaiton name.&lt;/P&gt;&lt;P&gt;If it is showing up as actual application name then as mentioned above it is just possible that you have minimal traffic for it and it is just now showing up in ACC tab.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;BR /&gt;Thanks&lt;/P&gt;&lt;P&gt;Numan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 18:31:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-protocol-50-invisible-in-vwire-mode/m-p/9260#M6778</guid>
      <dc:creator>mbutt</dc:creator>
      <dc:date>2013-08-29T18:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec-esp / Protocol 50 invisible in vwire mode ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-protocol-50-invisible-in-vwire-mode/m-p/9261#M6779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perhaps enable logging on session start to check if you see the logs then? When logging on session end, you will only see the log when the session end, so if there are keep alive packets send through the tunnel, you won't see a log.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 06:13:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-protocol-50-invisible-in-vwire-mode/m-p/9261#M6779</guid>
      <dc:creator>${userLoginName}</dc:creator>
      <dc:date>2013-08-30T06:13:38Z</dc:date>
    </item>
  </channel>
</rss>

