<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy not matching actual traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/policy-not-matching-actual-traffic/m-p/388320#M90483</link>
    <description>&lt;P&gt;Not applicable is because the firewall does not waste resources trying to identify it when it's already matched the deny rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you sure the rule is set up correctly? When NAT is involved, the security rule should be to the pre-NAT IP, but the post-NAT zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- DM&lt;/P&gt;</description>
    <pubDate>Sun, 28 Feb 2021 17:17:44 GMT</pubDate>
    <dc:creator>dmifsud</dc:creator>
    <dc:date>2021-02-28T17:17:44Z</dc:date>
    <item>
      <title>Policy not matching actual traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-not-matching-actual-traffic/m-p/385421#M90142</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a security rule to allow ip "A" to ssh to ip "B". I can see the traffic actually hitting the fw but it gets dropped with interzone-default. The test policy match also verifies that it matches the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IP "B" is actually the firewall. And IP "B" is nated like this: original packet source IP "C", original packet dest&amp;nbsp; ip "A", translated packet source ip "B".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can this happen? So the traffic hitting the firewall has an explicit allow rule but still missed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IP "A" is on the other end of the IPSec tunnel and when this traffic comes, it successfully creates a child SA. Routing is also set up for IP "A"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Chhers,&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 15:02:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-not-matching-actual-traffic/m-p/385421#M90142</guid>
      <dc:creator>olloczky</dc:creator>
      <dc:date>2021-02-11T15:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: Policy not matching actual traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-not-matching-actual-traffic/m-p/385612#M90163</link>
      <description>&lt;P&gt;I also noticed that in the logs it says "application not-applicable". But the log clearly says that it is port 22 which is used... very strange..&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2021 08:50:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-not-matching-actual-traffic/m-p/385612#M90163</guid>
      <dc:creator>olloczky</dc:creator>
      <dc:date>2021-02-12T08:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: Policy not matching actual traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-not-matching-actual-traffic/m-p/388320#M90483</link>
      <description>&lt;P&gt;Not applicable is because the firewall does not waste resources trying to identify it when it's already matched the deny rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you sure the rule is set up correctly? When NAT is involved, the security rule should be to the pre-NAT IP, but the post-NAT zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- DM&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2021 17:17:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-not-matching-actual-traffic/m-p/388320#M90483</guid>
      <dc:creator>dmifsud</dc:creator>
      <dc:date>2021-02-28T17:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: Policy not matching actual traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-not-matching-actual-traffic/m-p/388409#M90503</link>
      <description>&lt;P&gt;not-applicable is because the sesison is dropped, so the firewall doesn't care which application it is&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In regards to NAT:&amp;nbsp; you're connecting from A to B, but then have a NAT rule from C to A source B?&lt;/P&gt;&lt;P&gt;your nat rule is supposed to allign with the direction the session is being established in&lt;/P&gt;&lt;P&gt;so unless you forgot to mension bidirection is enabled, this will never work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;but then you add that IP A is at the remote end of an IPSec tunnel, so the tunnel happens between D and B?&lt;/P&gt;&lt;P&gt;A will actually egress out of the tunnel interface, this should be a different zone than interface B. Did you account for this in the NAT rule?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Mar 2021 16:27:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-not-matching-actual-traffic/m-p/388409#M90503</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2021-03-01T16:27:10Z</dc:date>
    </item>
  </channel>
</rss>

