<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pingdom &amp;amp; Management Profiles in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256163#M72674</link>
    <description>&lt;P&gt;By timing out you mean session end reason?&lt;/P&gt;&lt;P&gt;Well this is normal for udp and icmp protocols.&lt;/P&gt;&lt;P&gt;In case of TCP there is session setup and teardown procedure.&lt;/P&gt;</description>
    <pubDate>Thu, 04 Apr 2019 19:43:14 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2019-04-04T19:43:14Z</dc:date>
    <item>
      <title>Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/255979#M72612</link>
      <description>&lt;P&gt;Quick write here.&amp;nbsp; We currently use Pingdom to monitor external reachability to services and our remote office edge devices.&amp;nbsp; In some scenarios such as new office deployments, we may need to utilize the WAN interface to setup the device.&amp;nbsp; The problem here is the All-or-None approach of management profiles.&amp;nbsp; We want only ping from pingdom's probes and http from our specified management nodes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since pings to any interface are considered 'management' there's no way to setup a security policy to allow the probes, so my next question is now whether or not this is even possible?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2019 20:42:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/255979#M72612</guid>
      <dc:creator>Brett.Hoshaw</dc:creator>
      <dc:date>2019-04-03T20:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/255997#M72617</link>
      <description>&lt;P&gt;Can you configure GlobalProtect to connect to remote offices?&lt;/P&gt;&lt;P&gt;If not then you can create loopback interface and permit management on it (or DNAT to mgmt interface directly).&lt;/P&gt;&lt;P&gt;Set up DNAT to this loopback for mgmt traffic.&lt;/P&gt;&lt;P&gt;In security policy specify what source IPs are permitted to connect to manage firewall.&lt;/P&gt;&lt;P&gt;On external interface permit ping-only mgmt profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Be careful to limit this traffic as every now and then there are issues with security on mgmt traffic (&amp;nbsp;&lt;A href="https://securityadvisories.paloaltonetworks.com/" target="_blank"&gt;https://securityadvisories.paloaltonetworks.com/&lt;/A&gt;&amp;nbsp;).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2019 21:46:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/255997#M72617</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2019-04-03T21:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256082#M72636</link>
      <description>&lt;P&gt;Thanks for the link.&amp;nbsp; Question - it seems like those vulnerabilities are all towards the 'management interface'.&amp;nbsp; In my case, the management interface would not be accessible externally only internally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need a management profile on an external interface to allow pingdom probes to ping it, however I also need a management profile on the same interface to allow remote access in case of setup failures or VPN outages.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The loopback is a good idea but I question the security policy aspect since it seems like ping traffic with a destination of an interface on the palo does not show up in the traffic monitor which makes me wonder if this specific type of traffic is going to a different process - as if it classifies it as management traffic and compares it against the management profile.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 14:01:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256082#M72636</guid>
      <dc:creator>Brett.Hoshaw</dc:creator>
      <dc:date>2019-04-04T14:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256087#M72639</link>
      <description>&lt;P&gt;Security policies are evaluated top to down.&amp;nbsp;&lt;/P&gt;&lt;P&gt;First one that matches will take effect (either permit or deny).&lt;/P&gt;&lt;P&gt;If you don't have custom rule like this:&lt;/P&gt;&lt;P&gt;from zone - wan&lt;/P&gt;&lt;P&gt;from address - any&lt;/P&gt;&lt;P&gt;to zone - wan&lt;/P&gt;&lt;P&gt;to address - fw public ip&lt;/P&gt;&lt;P&gt;application - ping (or more relaxed like any)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then at the bottom intrazone-default rule will match.&lt;/P&gt;&lt;P&gt;This is not configured to write log by default.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Click on intrazone-default rule.&lt;/P&gt;&lt;P&gt;Click override at the bottom.&lt;/P&gt;&lt;P&gt;Open rule.&lt;/P&gt;&lt;P&gt;Actions tab.&lt;/P&gt;&lt;P&gt;Check "log at session end"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do the same with interzone-default&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 14:35:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256087#M72639</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2019-04-04T14:35:51Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256088#M72640</link>
      <description>&lt;P&gt;I'm familiar with the evaluation, what I'm not familiar with is how Palo treats specific traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had a specific security policy yesterday setup to allow pingdom probes to ping the external interface.&amp;nbsp; The pings still failed and the traffic monitor never showed any indicatation this traffic was attempted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is why I'm assuming that if traffic matches ping and the destination is the physical interface, it bypasses the security policy and utilizes the management profile instead.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 14:40:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256088#M72640</guid>
      <dc:creator>Brett.Hoshaw</dc:creator>
      <dc:date>2019-04-04T14:40:00Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256089#M72641</link>
      <description>&lt;P&gt;It does not pass security policy.&lt;/P&gt;&lt;P&gt;Enable loggign on intrazone-default and interzone-default rules.&lt;/P&gt;&lt;P&gt;If no rule mathes then they will.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 14:42:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256089#M72641</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2019-04-04T14:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256092#M72644</link>
      <description>&lt;P&gt;Alright, I think we are going in circles here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Security policies are evaluated top to down. 
First one that matches will take effect (either permit or deny).

If you don't have custom rule like this:
from zone - wan
from address - any
to zone - wan
to address - fw public ip
application - ping (or more relaxed like any)

Then at the bottom intrazone-default rule will match.

This is not configured to write log by default.
 
Click on intrazone-default rule.
Click override at the bottom.
Open rule.
Actions tab.
Check "log at session end"&lt;BR /&gt;&lt;BR /&gt;Do the same with interzone-default&lt;/PRE&gt;&lt;P&gt;The specific rule did exist in the security policy yesterday so the intrazone-default rule should not be catching this - therefor there should be a log and it should show in the traffic monitor tab, correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;It does not pass security policy.
Enable loggign on intrazone-default and interzone-default rules.
If no rule mathes then they will.&lt;/PRE&gt;&lt;P&gt;Now you've got me confused.&amp;nbsp; You said if there is a specific rule it should match and log there correct?&amp;nbsp; Otherwise it goes to intrazone-default or interzone-default.&amp;nbsp; So, even if there is a rule in the security policy for this traffic, it is still no matter what, considered intrazone-default or interzone-default? I have to turn on the logging for those to see the traffic logs, but this does not help reach the end goal of specifying what can and cannot ping an interface and what can browse (https) to the external interface.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 15:10:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256092#M72644</guid>
      <dc:creator>Brett.Hoshaw</dc:creator>
      <dc:date>2019-04-04T15:10:41Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256095#M72646</link>
      <description>&lt;P&gt;Well if the rule would have matched it would be in the log.&lt;/P&gt;&lt;P&gt;For example if you have following Security policy then you should see log:&lt;/P&gt;&lt;P&gt;From zone - wan&lt;/P&gt;&lt;P&gt;To zone - wan&lt;/P&gt;&lt;P&gt;From address - any&lt;/P&gt;&lt;P&gt;To address - fw public IP&lt;/P&gt;&lt;P&gt;Application - ping&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As soon as you add DNAT rule like the one below your security policy does not match any more because destination zone of the session is now LAN (not WAN):&lt;/P&gt;&lt;P&gt;From zone - wan&lt;/P&gt;&lt;P&gt;To zone - wan&lt;/P&gt;&lt;P&gt;Service - any&lt;/P&gt;&lt;P&gt;To address - fw public IP&lt;/P&gt;&lt;P&gt;Destination NAT to - some internal ip&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this case the rule does not match any more because &amp;lt;some internal ip&amp;gt; is in LAN zone and destination zone is switched in session header before security policy is checked so without knowing exactly how your security and nat policy were set up we don't know if the rule supposed to match.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For this reason i suggested to enable logging on default rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 15:38:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256095#M72646</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2019-04-04T15:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256100#M72648</link>
      <description>&lt;P&gt;I see now, I never setup the DNAT because I didn't want to expose the management interface externally.&amp;nbsp; So the rule in place is&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From - External&lt;/P&gt;&lt;P&gt;Source - Probes&lt;/P&gt;&lt;P&gt;To - External&lt;/P&gt;&lt;P&gt;Destination - External Interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRIKE&gt;I'm also questioning whether the external dynamic list is correctly populated.&amp;nbsp; I assume it does an initial pull before it re-checks on the schedule specified in creation?&amp;nbsp; Is there a way to see the current value of an external dynamic list?&lt;/STRIKE&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The external dynamic list is populating correctly, verified through CLI.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After 30 minutes we should have seen 30 logs, yet there's nothing there, even with the intra/inter logs enabled and filtering explicitly on the external interface address as the destination.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At this point I'm convinced that the management profile set on the external interface is the reason why it's failing and again the fact that you're pinging a physical interface proves that they somehow handle this management traffic differently than normal intra/inter zone traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 16:14:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256100#M72648</guid>
      <dc:creator>Brett.Hoshaw</dc:creator>
      <dc:date>2019-04-04T16:14:22Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256102#M72650</link>
      <description>&lt;P&gt;Are you using External Dynamic List?&lt;/P&gt;&lt;P&gt;In this case you can see entries if you go to Objects &amp;gt; External Dynamic Lists&lt;/P&gt;&lt;P&gt;Open the one you are using as source address.&lt;/P&gt;&lt;P&gt;List Entries And Exeptions tab.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 16:14:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256102#M72650</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2019-04-04T16:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256103#M72651</link>
      <description>&lt;P&gt;That's correct - it is populating correctly.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 16:15:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256103#M72651</guid>
      <dc:creator>Brett.Hoshaw</dc:creator>
      <dc:date>2019-04-04T16:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256104#M72652</link>
      <description>&lt;P&gt;Did you enable loggign on intrazone-default rule?&lt;/P&gt;&lt;P&gt;Do you see incoming pings now?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 16:16:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256104#M72652</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2019-04-04T16:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256105#M72653</link>
      <description>&lt;P&gt;Intra and Inter zone logging are both enabled.&amp;nbsp; There are no &lt;STRIKE&gt;logs&lt;/STRIKE&gt;&amp;nbsp;pings.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 16:17:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256105#M72653</guid>
      <dc:creator>Brett.Hoshaw</dc:creator>
      <dc:date>2019-04-04T16:17:56Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256106#M72654</link>
      <description>&lt;P&gt;Go to Monitor &amp;gt; Session Browser&lt;/P&gt;&lt;P&gt;Use filter:&lt;/P&gt;&lt;P&gt;(application eq 'ping')&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you see active sessions?&lt;/P&gt;&lt;P&gt;What rule do they match against?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 16:21:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256106#M72654</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2019-04-04T16:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256117#M72656</link>
      <description>&lt;P&gt;Negative.&amp;nbsp; No ping sessions.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 17:31:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256117#M72656</guid>
      <dc:creator>Brett.Hoshaw</dc:creator>
      <dc:date>2019-04-04T17:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256123#M72659</link>
      <description>&lt;P&gt;If it is not constant ping thenyou might miss it because ping sessions are cleared after 6 seconds.&lt;/P&gt;&lt;P&gt;&lt;A title="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRiCAK" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRiCAK" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRiCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 17:39:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256123#M72659</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2019-04-04T17:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256136#M72662</link>
      <description>&lt;P&gt;Fair enough.&amp;nbsp; This would be one ping every minute - I can't specify the exact second between each minute.&amp;nbsp; I did refresh the sessions page every few seconds for a couple of minutes and still didn't see any pings.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 17:43:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256136#M72662</guid>
      <dc:creator>Brett.Hoshaw</dc:creator>
      <dc:date>2019-04-04T17:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256156#M72669</link>
      <description>&lt;P&gt;Alright, I figured it out.&amp;nbsp; Feeling a little foolish here but essentially 3 of my 4 tabs were on the correct device in Panorama, the one that was not on the correct device had the IP I was setting up for rules, probes, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRIKE&gt;Issue resolved, there was no foul play, just user error.&lt;/STRIKE&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still running into the same issue - why traffic is not hitting the security policy rule but instead hitting the inter/intra zone rules.&amp;nbsp; I now see the traffic in the monitor, the dynamic list is populating the correct addresses, the destination address is correct but traffic flows are still aging out.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 18:55:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256156#M72669</guid>
      <dc:creator>Brett.Hoshaw</dc:creator>
      <dc:date>2019-04-04T18:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256161#M72673</link>
      <description>&lt;P&gt;Fixed the rules, needed to set the security policy type to 'intrazone' and changed the application from 'icmp' to 'ping'.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now traffic logs are hitting the rule, however still timing-out.&amp;nbsp; I'm wondering if this is due to the management profile now allowing the IPs for ping.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 19:23:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256161#M72673</guid>
      <dc:creator>Brett.Hoshaw</dc:creator>
      <dc:date>2019-04-04T19:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Pingdom &amp; Management Profiles</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256163#M72674</link>
      <description>&lt;P&gt;By timing out you mean session end reason?&lt;/P&gt;&lt;P&gt;Well this is normal for udp and icmp protocols.&lt;/P&gt;&lt;P&gt;In case of TCP there is session setup and teardown procedure.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 19:43:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pingdom-amp-management-profiles/m-p/256163#M72674</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2019-04-04T19:43:14Z</dc:date>
    </item>
  </channel>
</rss>

