<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic policy is clear yet traffic is still DENIED in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/policy-is-clear-yet-traffic-is-still-denied/m-p/374094#M89017</link>
    <description>&lt;P&gt;hi all, we have a policy that clearly states FROM and TO objects and SMB_override (custom app, I presume, created earlier) as the application. The service is configured as Application-default. As per Monitor, it goes straight through to the deny rule ignoring our Allow rule. The application is correctly identified, the port is right. all looks good. Yet it's being denied. It's not the first time PA does it. It's very frustrating. People now want ANY to ANY because PA works half the time&lt;/P&gt;</description>
    <pubDate>Mon, 14 Dec 2020 03:40:31 GMT</pubDate>
    <dc:creator>igs1917</dc:creator>
    <dc:date>2020-12-14T03:40:31Z</dc:date>
    <item>
      <title>policy is clear yet traffic is still DENIED</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-is-clear-yet-traffic-is-still-denied/m-p/374094#M89017</link>
      <description>&lt;P&gt;hi all, we have a policy that clearly states FROM and TO objects and SMB_override (custom app, I presume, created earlier) as the application. The service is configured as Application-default. As per Monitor, it goes straight through to the deny rule ignoring our Allow rule. The application is correctly identified, the port is right. all looks good. Yet it's being denied. It's not the first time PA does it. It's very frustrating. People now want ANY to ANY because PA works half the time&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 03:40:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-is-clear-yet-traffic-is-still-denied/m-p/374094#M89017</guid>
      <dc:creator>igs1917</dc:creator>
      <dc:date>2020-12-14T03:40:31Z</dc:date>
    </item>
    <item>
      <title>Re: policy is clear yet traffic is still DENIED</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-is-clear-yet-traffic-is-still-denied/m-p/374107#M89018</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/165374"&gt;@igs1917&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;What version of PAN-OS are you running? It doesn't give a lot of confidence that you are talking about using a custom app-id entry and you're presuming how it was configured if I'm being honest. How was the custom app-id configured? Are you using an application-override policy to override the traffic to your custom SMB_override app-id entry, or are you relying on a signature to identify the traffic?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you log into the CLI and run the&amp;nbsp;&lt;EM&gt;test security-policy-match&amp;nbsp;&lt;/EM&gt;command and enter the traffic exactly as displayed in one of the denied log entries is it showing a match in your security rulebase? If you can, share a few copies of the log that isn't matching the target security rulebase entry and the actual entry; chances are something is just improperly configured.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 04:59:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-is-clear-yet-traffic-is-still-denied/m-p/374107#M89018</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-12-14T04:59:50Z</dc:date>
    </item>
    <item>
      <title>Re: policy is clear yet traffic is still DENIED</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-is-clear-yet-traffic-is-still-denied/m-p/374109#M89020</link>
      <description>&lt;P&gt;Thank you, appreciate your help. We are running 9.0.9&lt;/P&gt;&lt;P&gt;Just a basic policy with a custom application. Basic custom app (SMB_Override) with a port (tcp/445). PA correctly recognizes it. I can do screenshot. I can see in the logs it's tcp 445. Yet it just does not work. It's not the first time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just had a look and the policy is set to "universal". all the rest are Interzone.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 05:19:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-is-clear-yet-traffic-is-still-denied/m-p/374109#M89020</guid>
      <dc:creator>igs1917</dc:creator>
      <dc:date>2020-12-14T05:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: policy is clear yet traffic is still DENIED</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-is-clear-yet-traffic-is-still-denied/m-p/374110#M89021</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/165374"&gt;@igs1917&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Screenshots would help a lot in this case. The issue with the custom app-id is really more to do with how it, and associated rulebase entries, have been configured. Does your SMB_override have a default port of tcp/445 listed so that your application-default on the service will actually function? Are you using a signature to identify the traffic or an application-override entry? I would assume with something named SMB_override you are simply using an application-override entry to disable layer7 processing on SMB traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Generally speaking, the firewall won't simply skip processing the traffic properly. More than likely, the denied traffic isn't actually 100% matching something within the security rulebase entry. That could have something to do with how the application-override (assuming there is an entry) is setup, or how the security rulebase entry itself is setup. Something however is causing the firewall to think that traffic doesn't match anymore.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 05:27:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-is-clear-yet-traffic-is-still-denied/m-p/374110#M89021</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-12-14T05:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: policy is clear yet traffic is still DENIED</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-is-clear-yet-traffic-is-still-denied/m-p/374117#M89023</link>
      <description>&lt;P&gt;no signature. A strict default port. That is hard set in the app.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it is logical that it shouldn't just skip.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;new update: I am looking at the firewall direct and the rule is missing all together, whereas in Panorama it's there. It could be that when new policy was created and was not pushed?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="monitor.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29120i211A7358F2FFF9C0/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="monitor.jpg" alt="monitor.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policy.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29121i9C0D520618E738B8/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="policy.jpg" alt="policy.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SMB_override.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29119i1CB982F249C33F40/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="SMB_override.jpg" alt="SMB_override.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="app group.jpg" style="width: 415px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29122i2F7EC89FB9477053/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="app group.jpg" alt="app group.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 05:57:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-is-clear-yet-traffic-is-still-denied/m-p/374117#M89023</guid>
      <dc:creator>igs1917</dc:creator>
      <dc:date>2020-12-14T05:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: policy is clear yet traffic is still DENIED</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-is-clear-yet-traffic-is-still-denied/m-p/374121#M89024</link>
      <description>&lt;P&gt;If the rule isn't there on the firewall, that means it hasn't been pushed down from Panorama yet, which would explain why the traffic is hitting the deny rule&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 08:03:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-is-clear-yet-traffic-is-still-denied/m-p/374121#M89024</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-12-14T08:03:03Z</dc:date>
    </item>
  </channel>
</rss>

