<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dropped traffic - no log in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dropped-traffic-no-log/m-p/1146#M897</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Setup:&lt;/P&gt;&lt;P&gt;LAN network on interface eth1/2, security device on interface eth1/3 and vpn on interface tunnel.1.&lt;/P&gt;&lt;P&gt;Zone L3-LAN contains eth1/2&lt;/P&gt;&lt;P&gt;Zone L3-VPN contains eth1/3 and tunnel.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic flow:&lt;/P&gt;&lt;P&gt;A client in the LAN sends a packet to a device behind the VPN tunnel. A PBF rule is in place that traffic originating from eth1/2 to a network behind the VPN is first send to a security device (eth1/3). This security device sends the exact same packet back tot he Palo Alto which should route it through the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A security rule is in place to allow traffic from L3-LAN to L3-VPN. &lt;/P&gt;&lt;P&gt;If have not yet created a rule allowing traffic from L3-VPN to L3-VPN the traffic is blocked and visible in the traffic monitor!&lt;/P&gt;&lt;P&gt;When I create a rule to allow the traffic, I see no logs in the traffic monitor anymore! (And the traffic does not go into the tunnel)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I check the global counters:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" src="https://live.paloaltonetworks.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i perform a debug flow basic then this is the only entry I get multiple times:&lt;/P&gt;&lt;P&gt;---__pan_debug_tag=2---pan_sys_up_ticks=3602846579449316---&lt;BR /&gt;Cannot de-NAT v4 packet, no port match&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" height="235" src="https://live.paloaltonetworks.com/legacyfs/online/9795_pastedImage_1.png" style="width: 522px; height: 234.9px;" width="522" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I create a new zone L3-SEC so I have the following:&lt;/P&gt;&lt;P&gt;Zone L3-LAN contains eth1/2&lt;/P&gt;&lt;P&gt;Zone L3-SEC contains eth1/3&lt;/P&gt;&lt;P&gt;Zone L3-VPN contains tunnel.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and adjust my policy rulebase, it all works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone explain this behavior?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 15 Nov 2013 13:42:49 GMT</pubDate>
    <dc:creator>${userLoginName}</dc:creator>
    <dc:date>2013-11-15T13:42:49Z</dc:date>
    <item>
      <title>Dropped traffic - no log</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dropped-traffic-no-log/m-p/1146#M897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Setup:&lt;/P&gt;&lt;P&gt;LAN network on interface eth1/2, security device on interface eth1/3 and vpn on interface tunnel.1.&lt;/P&gt;&lt;P&gt;Zone L3-LAN contains eth1/2&lt;/P&gt;&lt;P&gt;Zone L3-VPN contains eth1/3 and tunnel.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic flow:&lt;/P&gt;&lt;P&gt;A client in the LAN sends a packet to a device behind the VPN tunnel. A PBF rule is in place that traffic originating from eth1/2 to a network behind the VPN is first send to a security device (eth1/3). This security device sends the exact same packet back tot he Palo Alto which should route it through the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A security rule is in place to allow traffic from L3-LAN to L3-VPN. &lt;/P&gt;&lt;P&gt;If have not yet created a rule allowing traffic from L3-VPN to L3-VPN the traffic is blocked and visible in the traffic monitor!&lt;/P&gt;&lt;P&gt;When I create a rule to allow the traffic, I see no logs in the traffic monitor anymore! (And the traffic does not go into the tunnel)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I check the global counters:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" src="https://live.paloaltonetworks.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i perform a debug flow basic then this is the only entry I get multiple times:&lt;/P&gt;&lt;P&gt;---__pan_debug_tag=2---pan_sys_up_ticks=3602846579449316---&lt;BR /&gt;Cannot de-NAT v4 packet, no port match&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" height="235" src="https://live.paloaltonetworks.com/legacyfs/online/9795_pastedImage_1.png" style="width: 522px; height: 234.9px;" width="522" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I create a new zone L3-SEC so I have the following:&lt;/P&gt;&lt;P&gt;Zone L3-LAN contains eth1/2&lt;/P&gt;&lt;P&gt;Zone L3-SEC contains eth1/3&lt;/P&gt;&lt;P&gt;Zone L3-VPN contains tunnel.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and adjust my policy rulebase, it all works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone explain this behavior?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Nov 2013 13:42:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dropped-traffic-no-log/m-p/1146#M897</guid>
      <dc:creator>${userLoginName}</dc:creator>
      <dc:date>2013-11-15T13:42:49Z</dc:date>
    </item>
    <item>
      <title>Re: Dropped traffic - no log</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dropped-traffic-no-log/m-p/1147#M898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Here are some good tips on debugging packet drops&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;1. Need to setup the filters for the traffic we are interested in. To do this, execute the following steps:&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;Navigate to Monitor--Packet Capture&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;Click 'Manage Filters'&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;Set Filter ID 1 to be the source IP and destination IP of traffic you feel is affected ( leave all other fields blank )&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;Set Filter ID 2 to be the exact inverse of what you did in step 3 (destination IP in source field, Source IP in destination field)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;2. Setup up the captures&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;Create and name the file stage for a packet capture on all the stages (receive, transmit, firewall and drop)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;3. Enable filters and captures&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;debug dataplane packet-diag set filter on&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;debug dataplane packet-diag set capture on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;4. open 2 CLI windows&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;on 1 run the following command to look at the counter ( make sure it run this command once before running the traffic)&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;show counter global filter packet-filter yes delta yes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;on the 2nd window run the following command to look at he sessions&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;show session all filter source &amp;lt;ip address&amp;gt; destination &amp;lt;ip address&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;After your test has been done stop all the captures and filters and see if global counter show you anything why it is dropping the traffic or if you have getting pcap with drop stage.&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;This will help you narrow down the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 11pt; font-family: Calibri; color: #3b3b3b;"&gt;Let us know if this helps you resolve the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Nov 2013 16:25:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dropped-traffic-no-log/m-p/1147#M898</guid>
      <dc:creator>Phoenix</dc:creator>
      <dc:date>2013-11-15T16:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: Dropped traffic - no log</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dropped-traffic-no-log/m-p/1148#M899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The result of my show counter global did not get in my post for some reason:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;&amp;gt; show counter global filter delta yes packet-filter yes&lt;/P&gt;&lt;P lang="en-US"&gt;&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;Global counters:&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;Elapsed time since last sampling: 22.240 seconds&lt;/P&gt;&lt;P lang="en-US"&gt;&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; value&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rate severity&amp;nbsp; category aspect&amp;nbsp;&amp;nbsp;&amp;nbsp; description&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;pkt_recv&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9952&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 447 info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet pktproc&amp;nbsp;&amp;nbsp; Packets received&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;pkt_sent&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4 info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet pktproc&amp;nbsp;&amp;nbsp; Packets transmitted&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;pkt_outstanding&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4 info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet pktproc&amp;nbsp;&amp;nbsp; Outstanding packet to be transmitted&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;flow_rcv_dot1q_tag_err&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 drop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow parse&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets dropped: 802.1q tag not configured&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;flow_no_interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 drop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow parse&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets dropped: invalid interface&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;flow_host_pkt_rcv&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 107&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4 info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow mgmt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets received from control plane&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;flow_host_pkt_xmt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4 info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow mgmt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets transmitted to control plane&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;flow_host_ha_encap_err&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 14&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 drop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; flow mgmt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets dropped: encapsulation error to control plane's HA agent&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;ha_msg_recv&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 14&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ha system&amp;nbsp;&amp;nbsp;&amp;nbsp; HA: messages received&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;ha_err_decap&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 14&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 error&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ha system&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets dropped: HA message decapsulation error&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;Total counters shown: 10&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;The packet capture did not show any useful information.&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;My issue has already been resolved as mentioned in my post, by creating a third zone.&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;Kind regards,&lt;/P&gt;&lt;P lang="en-US" style="font-family: Calibri; font-size: 11.0pt;"&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Nov 2013 08:13:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dropped-traffic-no-log/m-p/1148#M899</guid>
      <dc:creator>${userLoginName}</dc:creator>
      <dc:date>2013-11-18T08:13:39Z</dc:date>
    </item>
  </channel>
</rss>

