<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA-220 - Missing Log for Traffic, Threat, URL, Data Filtering, Wildfire in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348171#M86705</link>
    <description>&lt;P&gt;&lt;STRONG&gt;show log traffic direction equal backward&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;admin@PA-220&amp;gt; show log traffic direction equal backward&lt;BR /&gt;Time App From Src Port Source&lt;BR /&gt;Rule Action To Dst Port Destination&lt;BR /&gt;Src User Dst User End Reason&lt;BR /&gt;Rule_UUid&lt;BR /&gt;====================================================================================================&lt;BR /&gt;2020/08/21 07:59:59 wechat-base SecurityZone_WiFi 54012 172.16.7.111&lt;BR /&gt;WiFi to Internet allow SecurityZone_Internet 80 203.205.255.143&lt;BR /&gt;tcp-fin&lt;BR /&gt;2020/08/21 07:59:49 dns SecurityZone_WiFi 49852 172.16.7.111&lt;BR /&gt;WiFi to Internet allow SecurityZone_Internet 53 210.0.128.251&lt;BR /&gt;aged-out&lt;BR /&gt;2020/08/21 07:59:49 dns SecurityZone_WiFi 43631 172.16.7.111&lt;BR /&gt;WiFi to Internet allow SecurityZone_Internet 53 210.0.128.251&lt;BR /&gt;aged-out&lt;BR /&gt;2020/08/21 07:59:42 incomplete SecurityZone_WiFi 33492 172.16.7.111&lt;BR /&gt;WiFi to Internet allow SecurityZone_Internet 80 47.246.16.233&lt;BR /&gt;tcp-rst-from-server&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show log threat direction equal backward&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;admin@PA-220&amp;gt; show log threat direction equal backward&lt;BR /&gt;Time App From Src Port Source&lt;BR /&gt;Rule Action To Dst Port Destination&lt;BR /&gt;Severity Src User Dst User Threat Pcap_id&lt;BR /&gt;Rule_UUid&lt;BR /&gt;==========================================================================================&lt;BR /&gt;2020/08/21 07:47:00 ssl SecurityZone_WiFi 39332 172.16.7.111&lt;BR /&gt;WiFi to Internet alert SecurityZone_Internet 443 203.119.216.50&lt;BR /&gt;info Non-RFC Compliant SSL Traffic on Port 443(56112) 0&lt;BR /&gt;2020/08/21 07:45:18 ssl SecurityZone_WiFi 39264 172.16.7.111&lt;BR /&gt;WiFi to Internet alert SecurityZone_Internet 443 203.119.216.50&lt;BR /&gt;info Non-RFC Compliant SSL Traffic on Port 443(56112) 0&lt;BR /&gt;2020/08/21 07:31:35 ssl SecurityZone_WiFi 54948 172.16.7.111&lt;BR /&gt;WiFi to Internet alert SecurityZone_Internet 443 203.119.217.112&lt;BR /&gt;info Non-RFC Compliant SSL Traffic on Port 443(56112) 0&lt;/PRE&gt;&lt;P&gt;&lt;STRONG&gt;show log url direction equal backward&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;admin@PA-220&amp;gt; show log url direction equal backward&lt;BR /&gt;Time App From Src Port Source&lt;BR /&gt;Rule Action To Dst Port Destination&lt;BR /&gt;Severity Src User Dst User Threat Pcap_id&lt;BR /&gt;Rule_UUid&lt;BR /&gt;==========================================================================================&lt;BR /&gt;2020/08/21 07:59:49 paloalto-wildfi SecurityZone_WiFi 60405 172.16.0.254&lt;BR /&gt;PA-220 to PAN-UPDAT alert SecurityZone_Internet 443 35.247.145.234&lt;BR /&gt;info (9999) 0&lt;BR /&gt;2020/08/21 07:57:49 paloalto-wildfi SecurityZone_WiFi 59305 172.16.0.254&lt;BR /&gt;PA-220 to PAN-UPDAT alert SecurityZone_Internet 443 35.247.145.234&lt;BR /&gt;info (9999) 0&lt;BR /&gt;2020/08/21 07:57:05 taobao SecurityZone_WiFi 46660 172.16.7.111&lt;BR /&gt;WiFi to Internet alert SecurityZone_Internet 443 140.205.252.4&lt;BR /&gt;info (9999) 0&lt;BR /&gt;2020/08/21 07:56:51 paloalto-update SecurityZone_WiFi 56117 172.16.0.254&lt;BR /&gt;PA-220 to PAN-UPDAT alert SecurityZone_Internet 443 199.167.52.141&lt;BR /&gt;info (9999) 0&lt;/PRE&gt;&lt;P&gt;&lt;STRONG&gt;debug software restart process management-server&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;debug software restart process management-server&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 10 Sep 2020 07:48:30 GMT</pubDate>
    <dc:creator>JamesChim</dc:creator>
    <dc:date>2020-09-10T07:48:30Z</dc:date>
    <item>
      <title>PA-220 - Missing Log for Traffic, Threat, URL, Data Filtering, Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348141#M86699</link>
      <description>&lt;P&gt;Hi Brother,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our PA-220 happen the GUI stopped the LOG records after the 21-AUG-2020 08:00.&lt;/P&gt;&lt;P&gt;Impact the Traffic Log, Threat Log, URL Filtering Log, Data Filtering Log, Wildfire Submission Log.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any experience on this issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;&lt;P&gt;JC&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 07:12:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348141#M86699</guid>
      <dc:creator>JamesChim</dc:creator>
      <dc:date>2020-09-10T07:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 - Missing Log for Traffic, Threat, URL, Data Filtering, Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348168#M86702</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/61973"&gt;@JamesChim&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can suggest to check below few points -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Check if the logging is enabled on the security polices where your traffic will hit. If someone have unchecked it and post that logs are not coming.&lt;/P&gt;&lt;P&gt;2. If it is enabled, run below commands under cli on the gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show log traffic direction equal backward&lt;/P&gt;&lt;P&gt;show log threat direction equal backward&lt;/P&gt;&lt;P&gt;show log url direction equal backward&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This will confirm you if logs are getting written on the firewall. If you are able to see logs under cli then you may need to restart &lt;STRONG&gt;management-server&amp;nbsp;process&lt;/STRONG&gt; on the gateway as it may be issue related to logs display on web interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also check license on the gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 07:35:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348168#M86702</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2020-09-10T07:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 - Missing Log for Traffic, Threat, URL, Data Filtering, Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348169#M86703</link>
      <description>&lt;P&gt;admin@PA-220&amp;gt; tail follow yes mp-log logrcvr.log&lt;BR /&gt;2020-09-10 14:46:29.980 +0800 debug: pan_sigdb_update_categoryhash(pan_sigdb.c:1232): after reading xml:1599720389&lt;BR /&gt;2020-09-10 14:46:29.985 +0800 debug: pan_sigdb_update_categoryhash_from_xml(pan_sigdb.c:1209): after converting to hash:1599720389&lt;BR /&gt;2020-09-10 14:46:30.906 +0800 debug: pan_logdb_writer_handle_overflow(pan_logdb_writer.c:3870): getting log num..&lt;BR /&gt;2020-09-10 14:46:30.907 +0800 Error: pan_logdb_get_nrecs(pan_logdb_utils.c:605): Invalid loghdr version(0x3) in /opt/pancfg/mgmt/logdb/traffic/1/20200910/pan.log&lt;BR /&gt;2020-09-10 14:46:30.907 +0800 Error: _get_log_num(pan_logdb_writer.c:3259): Failed to get nrecs for pan.0000000000.log&lt;BR /&gt;2020-09-10 14:46:30.907 +0800 Error: pan_logdb_writer_handle_overflow(pan_logdb_writer.c:3872): Error getting the last log num in dir:/opt/pancfg/mgmt/logdb/traffic/1/20200910&lt;BR /&gt;2020-09-10 14:46:30.907 +0800 Error: _write_task_disk_flush_process(pan_logdb_writer.c:2206): Error handling overflow.. will try for the next buffer again&lt;BR /&gt;2020-09-10 14:46:30.907 +0800 Error: _taskq_worker(pan_taskq.c:622): Error executing tasks process fn&lt;BR /&gt;2020-09-10 14:46:31.177 +0800 Error: _init_cache_handles(pan_sigdb.c:1614): Error getting dbfilename for db_type:3&lt;BR /&gt;2020-09-10 14:46:31.177 +0800 Error: pan_sigdb_enable_cache_handles(pan_sigdb.c:4081): Error initializing cache handles for db_type:WPC&lt;BR /&gt;2020-09-10 14:46:33.755 +0800 debug: pan_url_category_reset_defaults(pan_url_category.c:351): Revert to original BrightCloud categories&lt;BR /&gt;2020-09-10 14:46:33.755 +0800 debug: pan_url_category_reset_defaults(pan_url_category.c:356): Revert to original PAN categories&lt;BR /&gt;2020-09-10 14:46:33.845 +0800 debug: pan_log_convert_from_firewall_log(pan_log_receiver.c:2785): pan_log_convert_from_firewall_log, receive rule name WiFi to Internet, rule_uuid 742aea59-dca1-4728-9bac-9f0869a0c12a,&lt;BR /&gt;convert to rule_uuid_id 0x74 0x2a 0xea 0x59 0xdc 0xa1 0x47 0x28 0x9b 0xac 0x9f 0x8 0x69 0xa0 0xc1 0x2a&lt;BR /&gt;2020-09-10 14:46:33.845 +0800 debug: pan_log_convert_from_firewall_log(pan_log_receiver.c:2785): pan_log_convert_from_firewall_log, receive rule name WiFi to Internet, rule_uuid 742aea59-dca1-4728-9bac-9f0869a0c12a,&lt;BR /&gt;convert to rule_uuid_id 0x74 0x2a 0xea 0x59 0xdc 0xa1 0x47 0x28 0x9b 0xac 0x9f 0x8 0x69 0xa0 0xc1 0x2a&lt;BR /&gt;2020-09-10 14:46:33.846 +0800 debug: pan_log_convert_from_firewall_log(pan_log_receiver.c:2785): pan_log_convert_from_firewall_log, receive rule name WiFi to Internet, rule_uuid 742aea59-dca1-4728-9bac-9f0869a0c12a,&lt;BR /&gt;convert to rule_uuid_id 0x74 0x2a 0xea 0x59 0xdc 0xa1 0x47 0x28 0x9b 0xac 0x9f 0x8 0x69 0xa0 0xc1 0x2a&lt;BR /&gt;2020-09-10 14:46:33.846 +0800 debug: pan_log_convert_from_firewall_log(pan_log_receiver.c:2785): pan_log_convert_from_firewall_log, receive rule name WiFi to Internet, rule_uuid 742aea59-dca1-4728-9bac-9f0869a0c12a,&lt;BR /&gt;convert to rule_uuid_id 0x74 0x2a 0xea 0x59 0xdc 0xa1 0x47 0x28 0x9b 0xac 0x9f 0x8 0x69 0xa0 0xc1 0x2a&lt;BR /&gt;2020-09-10 14:46:33.846 +0800 debug: pan_log_convert_from_firewall_log(pan_log_receiver.c:2785): pan_log_convert_from_firewall_log, receive rule name WiFi to Internet, rule_uuid 742aea59-dca1-4728-9bac-9f0869a0c12a,&lt;BR /&gt;convert to rule_uuid_id 0x74 0x2a 0xea 0x59 0xdc 0xa1 0x47 0x28 0x9b 0xac 0x9f 0x8 0x69 0xa0 0xc1 0x2a&lt;BR /&gt;2020-09-10 14:46:33.847 +0800 handling logdb overflow..&lt;BR /&gt;2020-09-10 14:46:33.847 +0800 Checking to purge traffic logtype&lt;BR /&gt;2020-09-10 14:46:34.719 +0800 debug: pan_log_convert_from_firewall_log(pan_log_receiver.c:2785): pan_log_convert_from_firewall_log, receive rule name BLOCK-LIST_ByIn, rule_uuid 6ceeb8db-96dc-472c-8e14-915d8392d02b,&lt;BR /&gt;convert to rule_uuid_id 0x6c 0xee 0xb8 0xdb 0x96 0xdc 0x47 0x2c 0x8e 0x14 0x91 0x5d 0x83 0x92 0xd0 0x2b&lt;BR /&gt;2020-09-10 14:46:35.837 +0800 debug: pan_logdb_writer_handle_overflow(pan_logdb_writer.c:3870): getting log num..&lt;BR /&gt;2020-09-10 14:46:35.837 +0800 Error: pan_logdb_get_nrecs(pan_logdb_utils.c:605): Invalid loghdr version(0x3) in /opt/pancfg/mgmt/logdb/traffic/1/20200910/pan.log&lt;BR /&gt;2020-09-10 14:46:35.837 +0800 Error: _get_log_num(pan_logdb_writer.c:3259): Failed to get nrecs for pan.0000000000.log&lt;BR /&gt;2020-09-10 14:46:35.837 +0800 Error: pan_logdb_writer_handle_overflow(pan_logdb_writer.c:3872): Error getting the last log num in dir:/opt/pancfg/mgmt/logdb/traffic/1/20200910&lt;BR /&gt;2020-09-10 14:46:35.837 +0800 Error: _write_task_disk_flush_process(pan_logdb_writer.c:2206): Error handling overflow.. will try for the next buffer again&lt;BR /&gt;2020-09-10 14:46:35.837 +0800 Error: _taskq_worker(pan_taskq.c:622): Error executing tasks process fn&lt;BR /&gt;2020-09-10 14:46:38.552 +0800 handling logdb overflow..&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 07:36:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348169#M86703</guid>
      <dc:creator>JamesChim</dc:creator>
      <dc:date>2020-09-10T07:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 - Missing Log for Traffic, Threat, URL, Data Filtering, Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348170#M86704</link>
      <description>&lt;P&gt;Plus to what &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/132521"&gt;@SutareMayur&lt;/a&gt;&lt;SPAN class=""&gt;said.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;ِAt the end try rebooting the firewall&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 07:48:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348170#M86704</guid>
      <dc:creator>Abdul-Fattah</dc:creator>
      <dc:date>2020-09-10T07:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 - Missing Log for Traffic, Threat, URL, Data Filtering, Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348171#M86705</link>
      <description>&lt;P&gt;&lt;STRONG&gt;show log traffic direction equal backward&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;admin@PA-220&amp;gt; show log traffic direction equal backward&lt;BR /&gt;Time App From Src Port Source&lt;BR /&gt;Rule Action To Dst Port Destination&lt;BR /&gt;Src User Dst User End Reason&lt;BR /&gt;Rule_UUid&lt;BR /&gt;====================================================================================================&lt;BR /&gt;2020/08/21 07:59:59 wechat-base SecurityZone_WiFi 54012 172.16.7.111&lt;BR /&gt;WiFi to Internet allow SecurityZone_Internet 80 203.205.255.143&lt;BR /&gt;tcp-fin&lt;BR /&gt;2020/08/21 07:59:49 dns SecurityZone_WiFi 49852 172.16.7.111&lt;BR /&gt;WiFi to Internet allow SecurityZone_Internet 53 210.0.128.251&lt;BR /&gt;aged-out&lt;BR /&gt;2020/08/21 07:59:49 dns SecurityZone_WiFi 43631 172.16.7.111&lt;BR /&gt;WiFi to Internet allow SecurityZone_Internet 53 210.0.128.251&lt;BR /&gt;aged-out&lt;BR /&gt;2020/08/21 07:59:42 incomplete SecurityZone_WiFi 33492 172.16.7.111&lt;BR /&gt;WiFi to Internet allow SecurityZone_Internet 80 47.246.16.233&lt;BR /&gt;tcp-rst-from-server&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show log threat direction equal backward&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;admin@PA-220&amp;gt; show log threat direction equal backward&lt;BR /&gt;Time App From Src Port Source&lt;BR /&gt;Rule Action To Dst Port Destination&lt;BR /&gt;Severity Src User Dst User Threat Pcap_id&lt;BR /&gt;Rule_UUid&lt;BR /&gt;==========================================================================================&lt;BR /&gt;2020/08/21 07:47:00 ssl SecurityZone_WiFi 39332 172.16.7.111&lt;BR /&gt;WiFi to Internet alert SecurityZone_Internet 443 203.119.216.50&lt;BR /&gt;info Non-RFC Compliant SSL Traffic on Port 443(56112) 0&lt;BR /&gt;2020/08/21 07:45:18 ssl SecurityZone_WiFi 39264 172.16.7.111&lt;BR /&gt;WiFi to Internet alert SecurityZone_Internet 443 203.119.216.50&lt;BR /&gt;info Non-RFC Compliant SSL Traffic on Port 443(56112) 0&lt;BR /&gt;2020/08/21 07:31:35 ssl SecurityZone_WiFi 54948 172.16.7.111&lt;BR /&gt;WiFi to Internet alert SecurityZone_Internet 443 203.119.217.112&lt;BR /&gt;info Non-RFC Compliant SSL Traffic on Port 443(56112) 0&lt;/PRE&gt;&lt;P&gt;&lt;STRONG&gt;show log url direction equal backward&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;admin@PA-220&amp;gt; show log url direction equal backward&lt;BR /&gt;Time App From Src Port Source&lt;BR /&gt;Rule Action To Dst Port Destination&lt;BR /&gt;Severity Src User Dst User Threat Pcap_id&lt;BR /&gt;Rule_UUid&lt;BR /&gt;==========================================================================================&lt;BR /&gt;2020/08/21 07:59:49 paloalto-wildfi SecurityZone_WiFi 60405 172.16.0.254&lt;BR /&gt;PA-220 to PAN-UPDAT alert SecurityZone_Internet 443 35.247.145.234&lt;BR /&gt;info (9999) 0&lt;BR /&gt;2020/08/21 07:57:49 paloalto-wildfi SecurityZone_WiFi 59305 172.16.0.254&lt;BR /&gt;PA-220 to PAN-UPDAT alert SecurityZone_Internet 443 35.247.145.234&lt;BR /&gt;info (9999) 0&lt;BR /&gt;2020/08/21 07:57:05 taobao SecurityZone_WiFi 46660 172.16.7.111&lt;BR /&gt;WiFi to Internet alert SecurityZone_Internet 443 140.205.252.4&lt;BR /&gt;info (9999) 0&lt;BR /&gt;2020/08/21 07:56:51 paloalto-update SecurityZone_WiFi 56117 172.16.0.254&lt;BR /&gt;PA-220 to PAN-UPDAT alert SecurityZone_Internet 443 199.167.52.141&lt;BR /&gt;info (9999) 0&lt;/PRE&gt;&lt;P&gt;&lt;STRONG&gt;debug software restart process management-server&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;debug software restart process management-server&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 07:48:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348171#M86705</guid>
      <dc:creator>JamesChim</dc:creator>
      <dc:date>2020-09-10T07:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 - Missing Log for Traffic, Threat, URL, Data Filtering, Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348176#M86707</link>
      <description>&lt;P&gt;I tried to restart the device via the GUI Reboot/Physical Power Off and Power On&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem still in &amp;gt;...&amp;lt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 07:55:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348176#M86707</guid>
      <dc:creator>JamesChim</dc:creator>
      <dc:date>2020-09-10T07:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 - Missing Log for Traffic, Threat, URL, Data Filtering, Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348182#M86710</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129900"&gt;@Abdul-Fattah&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried to restart the device via the GUI Reboot/Physical Power Off and Power On&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem still in &amp;gt;...&amp;lt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 08:05:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348182#M86710</guid>
      <dc:creator>JamesChim</dc:creator>
      <dc:date>2020-09-10T08:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 - Missing Log for Traffic, Threat, URL, Data Filtering, Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348183#M86711</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/61973"&gt;@JamesChim&lt;/a&gt;&amp;nbsp;try restart the Log-reciever&amp;nbsp;proccess&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;debug software restart &lt;STRONG&gt;process&amp;nbsp;&lt;/STRONG&gt;log-receiver&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 08:06:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348183#M86711</guid>
      <dc:creator>Abdul-Fattah</dc:creator>
      <dc:date>2020-09-10T08:06:05Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 - Missing Log for Traffic, Threat, URL, Data Filtering, Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348184#M86712</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129900"&gt;@Abdul-Fattah&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem still in via below comment &amp;gt;...&amp;lt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;show log traffic direction equal backward&lt;BR /&gt;show log url direction equal backward&lt;BR /&gt;show log threat direction equal backward&lt;BR /&gt;debug log-receiver statistics&lt;BR /&gt;debug log-receiver on debug&lt;BR /&gt;tail follow yes mp-log logrcvr.log&lt;BR /&gt;debug software restart &lt;STRONG&gt;process&amp;nbsp;&lt;/STRONG&gt;log-receiver&lt;BR /&gt;&lt;/SPAN&gt;debug software restart process management-server&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 08:11:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348184#M86712</guid>
      <dc:creator>JamesChim</dc:creator>
      <dc:date>2020-09-10T08:11:01Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 - Missing Log for Traffic, Threat, URL, Data Filtering, Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348185#M86713</link>
      <description>&lt;P&gt;Try then Clearing the logs if you do not need them.&lt;BR /&gt;are you sure Firewall passing traffic?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 08:24:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348185#M86713</guid>
      <dc:creator>Abdul-Fattah</dc:creator>
      <dc:date>2020-09-10T08:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 - Missing Log for Traffic, Threat, URL, Data Filtering, Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348186#M86714</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129900"&gt;@Abdul-Fattah&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Finally, need clear all log include the traffic, threat, URL and etc, and then the latest traffic logs are coming.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but don't know what happens....... haha&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;are you sure Firewall passing traffic?&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV class="lia-quilt-column lia-quilt-column-18 lia-quilt-column-left lia-quilt-column-main-left"&gt;&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-left"&gt;&lt;DIV class="lia-product-tag-list lia-component-product-snippet lia-component-message-view-widget-product-snippet"&gt;-&amp;gt; I think yes, no user report cannot access the internet.&lt;/DIV&gt;&lt;DIV class="lia-product-tag-list lia-component-product-snippet lia-component-message-view-widget-product-snippet"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="lia-quilt-column lia-quilt-column-06 lia-quilt-column-right lia-quilt-column-main-right"&gt;&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-right"&gt;&lt;DIV class="lia-panel lia-panel-standard MessageTagsTaplet Chrome lia-component-message-view-widget-tags"&gt;&lt;DIV class="lia-decoration-border"&gt;&lt;DIV class="lia-decoration-border-top"&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="lia-decoration-border-content"&gt;&lt;DIV&gt;&lt;DIV class="lia-panel-heading-bar-wrapper"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 10 Sep 2020 08:43:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348186#M86714</guid>
      <dc:creator>JamesChim</dc:creator>
      <dc:date>2020-09-10T08:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: PA-220 - Missing Log for Traffic, Threat, URL, Data Filtering, Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348206#M86716</link>
      <description>&lt;P&gt;you are welcome.&lt;BR /&gt;Make sure the option " Stop Traffic when LogDB full" is disabled you can find it in (Device &amp;gt; Management &amp;gt; Logging Settings &amp;gt; Log Export and Reporting", because by defualt the firewall overwrite old traffic when Storage is full.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 09:27:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-220-missing-log-for-traffic-threat-url-data-filtering/m-p/348206#M86716</guid>
      <dc:creator>Abdul-Fattah</dc:creator>
      <dc:date>2020-09-10T09:27:31Z</dc:date>
    </item>
  </channel>
</rss>

