<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wire shark in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wire-shark/m-p/12232#M8960</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If firewall is just a pass through device for vpn connection, you will only see encrypted packets in the packet capture. This packet will also be one of them. From PA's perspective, you can verify if the firewall is dropping any packets from source and destination in question. If not, you will have to look for vpn end devices. If firewall is dropping packets, we can further look at the counters to see reason behind it.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Apr 2014 14:00:47 GMT</pubDate>
    <dc:creator>ssharma</dc:creator>
    <dc:date>2014-04-16T14:00:47Z</dc:date>
    <item>
      <title>Wire shark</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wire-shark/m-p/12231#M8959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am trying to troubleshoot why I am having issues with a certain VPN router device through the PA 3020 firewall, This is the message on the packet capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1f497d; font-family: 'Calibri','sans-serif'; font-size: 11pt;"&gt;ISAKMP Identity protection (main mode).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1f497d; font-family: 'Calibri','sans-serif'; font-size: 11pt;"&gt;I am new to firewall and if there are any other troubleshooting methods I can use I would appreciate the advice. commands, gui anything&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Apr 2014 13:10:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wire-shark/m-p/12231#M8959</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-04-16T13:10:30Z</dc:date>
    </item>
    <item>
      <title>Re: Wire shark</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wire-shark/m-p/12232#M8960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If firewall is just a pass through device for vpn connection, you will only see encrypted packets in the packet capture. This packet will also be one of them. From PA's perspective, you can verify if the firewall is dropping any packets from source and destination in question. If not, you will have to look for vpn end devices. If firewall is dropping packets, we can further look at the counters to see reason behind it.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Apr 2014 14:00:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wire-shark/m-p/12232#M8960</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-04-16T14:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: Wire shark</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wire-shark/m-p/12233#M8961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the VPN router just resides behind the firewall and goes through the firewall to a remote desitnation at a vendor location. The vendor say that the tunnel to our location are in an up/down state, and I am unable to ping,from command line on our server, their remote destination IP's.&amp;nbsp; I am not sure if the firewall is blocking packets going in or out for sure not sure the best tool in the PA or outside the PA to determine that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Apr 2014 14:34:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wire-shark/m-p/12233#M8961</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-04-16T14:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: Wire shark</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wire-shark/m-p/12234#M8962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do packet capture on PAN for the source/destination ip of VPN end points and see if there are any drops from PAN. That should verify if you need to look into other device. Here is a link to do pcap on PAN :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="loading" href="https://live.paloaltonetworks.com/docs/DOC-3265" title="https://live.paloaltonetworks.com/docs/DOC-3265"&gt;https://live.paloaltonetworks.com/docs/DOC-3265&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Apr 2014 16:32:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wire-shark/m-p/12234#M8962</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-04-16T16:32:46Z</dc:date>
    </item>
    <item>
      <title>Re: Wire shark</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wire-shark/m-p/12235#M8963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks those were excellent step by step instructions on doing a packet capture, so now how do I interpret the information so I know what the issue is and how to fix it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Apr 2014 17:23:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wire-shark/m-p/12235#M8963</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-04-16T17:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: Wire shark</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wire-shark/m-p/12236#M8964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now, if you capture the traffic between the vpn end points (source and destination) on PAN and if you see any drops, that could be of concern and we have to see why PAN is dropping the packets. If we do not see any drops, then you can look for other device that might be causing the issue. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Apr 2014 19:37:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wire-shark/m-p/12236#M8964</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-04-16T19:37:45Z</dc:date>
    </item>
  </channel>
</rss>

