<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet capture hitting specific security policies? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/393491#M91019</link>
    <description>&lt;P&gt;At this time packet captures are still pretty much source-destination-port type of deal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could reach out to your local sales guys to submit a feature request, that way it may eventually get added (post the FR number here so we can all reach out to our sales guys and vote for this feature to be added &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; )&lt;/P&gt;</description>
    <pubDate>Wed, 24 Mar 2021 17:45:35 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2021-03-24T17:45:35Z</dc:date>
    <item>
      <title>Packet capture hitting specific security policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/393261#M90996</link>
      <description>&lt;P&gt;I would really like the capability to setup packet captures for traffic that hits specific security rules. For example, we have rules that block outbound connections to Palo's dynamic IP list for known malicious IP addresses and would like packet captures taken when traffic hits that rule. I've not seen that capability and haven't seen a forum post related to it for several years. Anyone know if this is currently supported?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 12:45:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/393261#M90996</guid>
      <dc:creator>Mr_Kaplan</dc:creator>
      <dc:date>2021-03-24T12:45:49Z</dc:date>
    </item>
    <item>
      <title>Re: Packet capture hitting specific security policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/393491#M91019</link>
      <description>&lt;P&gt;At this time packet captures are still pretty much source-destination-port type of deal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could reach out to your local sales guys to submit a feature request, that way it may eventually get added (post the FR number here so we can all reach out to our sales guys and vote for this feature to be added &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; )&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 17:45:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/393491#M91019</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2021-03-24T17:45:35Z</dc:date>
    </item>
    <item>
      <title>Re: Packet capture hitting specific security policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/393540#M91027</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;What type of information are you looking to get out of the pcap that already isnt in the logs?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just curious at the use case to better assist.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 19:29:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/393540#M91027</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-03-24T19:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: Packet capture hitting specific security policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/393692#M91037</link>
      <description>&lt;P&gt;The answer is a bit open ended. It depends on the rule being hit or the traffic we want to monitor. For example, traffic going outbound hitting the known malicious IP list could be any service or application including NTP, DNS, HTTP, etc. Packet captures would give us more details including potential payload info, URIs, hostnames in queries, etc. Don't always see that in the firewall logs.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 02:37:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/393692#M91037</guid>
      <dc:creator>Mr_Kaplan</dc:creator>
      <dc:date>2021-03-25T02:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: Packet capture hitting specific security policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/393997#M91066</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;That was my assumption but wanted to be sure. Within the Security Profiles, you can set them to perform a pcap. This is however not a full blown pcapc, but something that the PAN san in brevity and already knows about. However if you want full pcaps, a 3rd party solution would be the best answer.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_0-1616690618308.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30555i426DB940E9B3C896/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_0-1616690618308.png" alt="OtakarKlier_0-1616690618308.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_1-1616690652739.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30556i2E3ABDD5F0799420/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_1-1616690652739.png" alt="OtakarKlier_1-1616690652739.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_2-1616690676899.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30557i78A7E0A9901DA10E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_2-1616690676899.png" alt="OtakarKlier_2-1616690676899.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 16:45:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/393997#M91066</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-03-25T16:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: Packet capture hitting specific security policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/394125#M91078</link>
      <description>&lt;P&gt;Yes, we're aware of the PCAP options on the threat prevention profiles, but those won't fire on the block rules that we're interested in, unfortunately.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Mar 2021 05:12:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/394125#M91078</guid>
      <dc:creator>Mr_Kaplan</dc:creator>
      <dc:date>2021-03-26T05:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: Packet capture hitting specific security policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/394222#M91084</link>
      <description>&lt;P&gt;The only idea I have is to first test a filter to see that it matches a policy that drops traffic with the test security policy feature &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/test-policy-rule-traffic-matches.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/test-policy-rule-traffic-matches.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After that you can use the same filter for pcap captures on the drop stage (captures only packets dropped by the firewall)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can also use global counters and flow basic with the same pcap filter if you need see something more:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloNCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloNCAS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://palo-alto.fandom.com/wiki/Flow_Basic" target="_blank"&gt;https://palo-alto.fandom.com/wiki/Flow_Basic&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need to play but Palo Alto has better options than most firewalls in my opnion. There is even option to capture traffic for a specific application or service/deamon:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/monitoring/take-packet-captures/take-an-application-packet-capture/take-a-custom-application-packet-capture.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/monitoring/take-packet-captures/take-an-application-packet-capture/take-a-custom-application-packet-capture.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClS8CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClS8CAK&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Mar 2021 09:49:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/394222#M91084</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2021-03-26T09:49:08Z</dc:date>
    </item>
    <item>
      <title>Re: Packet capture hitting specific security policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/394259#M91088</link>
      <description>&lt;P&gt;I forgot to add that if you want to monitor which source IP tried to connect to which bad destination on a specific rule, then just make a custom report. You can then even schedule the report and recieve an email. Just add log at session end under the security rule and use the below example but also add the source and destination and maybe how many times the rule was hit (this maybe is not needed in the report as it is seen under the security policy itself &lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-new-features/management-features/rule-usage-tracking.html" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-new-features/management-features/rule-usage-tracking.html&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example custom report:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcgCAC" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcgCAC&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Mar 2021 11:12:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/394259#M91088</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2021-03-26T11:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: Packet capture hitting specific security policies?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/394352#M91116</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;3rd Party solutions would be used to just capture everything then you can search for the traffic that was blocked. I know SecurityOnion does this fairly well, however you needs taps/span ports and a lot of storage to capture the traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just a thought.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Mar 2021 14:44:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/packet-capture-hitting-specific-security-policies/m-p/394352#M91116</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-03-26T14:44:28Z</dc:date>
    </item>
  </channel>
</rss>

