<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA200 stops processing traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa200-stops-processing-traffic/m-p/13352#M9792</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Slawek,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be difficult to isolate the issue from above mentioned logs. There could be many reasons, while traffic was not through the PA-200 firewall. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest a few things to check if there would be another occurrence of the same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;You may try to do &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;an&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; "nslookup" on one of the testing PC, see if it is resolving the IP address for an URL. &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;After that, in the GUI --&amp;gt; Traffic log, you may use filters like &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;addr&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;src&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; in IP_ADD_OF_THE_TESTING_PC&lt;SPAN class="GINGER_SOFTWARE_mark"&gt; )&lt;/SPAN&gt; and &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;addr&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dst&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; in IP_ADD_OF_THE_DESTINATION&lt;SPAN class="GINGER_SOFTWARE_mark"&gt; )&lt;/SPAN&gt; to check the security policy that the traffic hitting. &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Also you&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; can check the real time session in the CLI by using 'show session all filter &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;source&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; IP_ADD_OF_THE_TESTING_PC destination IP_ADD_OF_THE_DESTINATION'.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&amp;gt;&amp;nbsp; If there is &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;an&lt;/SPAN&gt; session exist for the same traffic,&amp;nbsp; then please &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;apply&amp;nbsp; CLI command PAN&amp;gt; show session id XYZ&amp;nbsp;&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; to get detailed information about that session, &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;i.e&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt; NAT rule, security rule, ingress/egress interface etc.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;nbsp; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;verify&lt;/SPAN&gt; the global counters, if a specific "DRP" counter is increasing rapidly. &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;The command &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier; color: #3b3b3b;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;show&lt;/SPAN&gt; counter global&lt;/SPAN&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt; provides information about the processes/actions taken on the packets going through the device; if they are dropped, &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;nat&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ed&lt;/SPAN&gt;, decrypted etc.&amp;nbsp; These counters are for all the traffic going through the device and are useful in troubleshooting issues; like poor performance, packet loss, latency etc. It is advised to use the command &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier; color: #3b3b3b;"&gt;show counter global filter packet-filter yes delta yes&lt;/SPAN&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt; in conjunction with filters to obtain meaningful data.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For more information, you can follow the DOC &lt;A href="https://live.paloaltonetworks.com/docs/DOC-4650"&gt;What is the Significance of Global Counters?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; You can enable FLOW BASIC feature to understand the exact reason behind the failure:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; clear all&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; set filter match source&amp;nbsp; IP_ADD_OF_THE_TESTING_PC destination IP_ADD_OF_THE_DESTINATION&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; set filter match source IP_ADD_OF_THE_DESTINATION destination&amp;nbsp; IP_ADD_OF_THE_TESTING_PC&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; set log feature flow &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;basic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; set log feature &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;tcp&lt;/SPAN&gt; all&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; set filter on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&amp;gt; &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-size: 10pt; line-height: 1.5em;"&gt;debug&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-size: 10pt; line-height: 1.5em;"&gt;dataplane&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; packet-&lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-size: 10pt; line-height: 1.5em;"&gt;diag&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; set log on&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; ~~~~~~~~~~~~~~~~ Initiate traffic through the PAN firewall/try to browse a website ~~~~~~~~~~~~~~~~~~~~~~~~~&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; set log off&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; aggregate-logs&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;less&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;mp&lt;/SPAN&gt;-log pan_packetdiag_log.log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For more information, you can follow the DOC: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1506"&gt;Packet Capture, Debug Flow-basic and Counter Commands&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 26 May 2014 17:54:57 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-05-26T17:54:57Z</dc:date>
    <item>
      <title>PA200 stops processing traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa200-stops-processing-traffic/m-p/13351#M9791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;H&lt;/P&gt;&lt;P&gt;I know PA-3050 stops processing traffic topic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to my knowledge PA200 has virtualized hardware (hasn't ASICs) so it a bit different case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recently my device stoped responding for ping, stopped processing traffic. After power off/on started working OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In logs close to time when it failed nothing was special but there was a lot of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1,2014/05/21 19:54:01,001606004641,SYSTEM,dnsproxy,0,2014/05/21 19:54:01,,resolve-fail,DNS_proxy_1,0,0,general,informational,Failed to resolve domain name:su.ff.avast.com after trying all attempts to name server(s): 192.168.1.254&amp;nbsp; 192.168.1.253 ,244184,0x0&lt;/P&gt;&lt;P&gt;1,2014/05/21 19:54:01,001606004641,SYSTEM,dnsproxy,0,2014/05/21 19:54:01,,resolve-fail,DNS_proxy_2,0,0,general,informational,Failed to resolve domain name:android.clients.google.com after trying all attempts to name server(s): 192.168.1.254&amp;nbsp; 192.168.1.253 ,244183,0x0&lt;/P&gt;&lt;P&gt;1,2014/05/21 19:54:00,001606004641,SYSTEM,dnsproxy,0,2014/05/21 19:54:00,,resolve-fail,DNS_proxy_2,0,0,general,informational,Failed to resolve domain name:daisy.ubuntu.com after trying all attempts to name server(s): 192.168.1.254&amp;nbsp; 192.168.1.253 ,244182,0x0&lt;/P&gt;&lt;P&gt;1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The strange thing was that after the time when device stopped processing traffic still logged similar entries (resolve fail)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had problem with dns proxy on 5.0.7 after I moved to 5.0.9 (as I remember 5.0.9 fixes dns proxy problems) problem gone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone issues on 6.0.x with dns proxy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Support can't find from tech support file the root cause of the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards&lt;/P&gt;&lt;P&gt;Slawek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 May 2014 09:27:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa200-stops-processing-traffic/m-p/13351#M9791</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2014-05-26T09:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: PA200 stops processing traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa200-stops-processing-traffic/m-p/13352#M9792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Slawek,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be difficult to isolate the issue from above mentioned logs. There could be many reasons, while traffic was not through the PA-200 firewall. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest a few things to check if there would be another occurrence of the same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;You may try to do &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;an&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; "nslookup" on one of the testing PC, see if it is resolving the IP address for an URL. &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;After that, in the GUI --&amp;gt; Traffic log, you may use filters like &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;addr&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;src&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; in IP_ADD_OF_THE_TESTING_PC&lt;SPAN class="GINGER_SOFTWARE_mark"&gt; )&lt;/SPAN&gt; and &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;addr&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dst&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; in IP_ADD_OF_THE_DESTINATION&lt;SPAN class="GINGER_SOFTWARE_mark"&gt; )&lt;/SPAN&gt; to check the security policy that the traffic hitting. &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Also you&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; can check the real time session in the CLI by using 'show session all filter &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;source&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; IP_ADD_OF_THE_TESTING_PC destination IP_ADD_OF_THE_DESTINATION'.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&amp;gt;&amp;nbsp; If there is &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;an&lt;/SPAN&gt; session exist for the same traffic,&amp;nbsp; then please &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;apply&amp;nbsp; CLI command PAN&amp;gt; show session id XYZ&amp;nbsp;&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; to get detailed information about that session, &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;i.e&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt; NAT rule, security rule, ingress/egress interface etc.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;nbsp; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;verify&lt;/SPAN&gt; the global counters, if a specific "DRP" counter is increasing rapidly. &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;The command &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier; color: #3b3b3b;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;show&lt;/SPAN&gt; counter global&lt;/SPAN&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt; provides information about the processes/actions taken on the packets going through the device; if they are dropped, &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;nat&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ed&lt;/SPAN&gt;, decrypted etc.&amp;nbsp; These counters are for all the traffic going through the device and are useful in troubleshooting issues; like poor performance, packet loss, latency etc. It is advised to use the command &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier; color: #3b3b3b;"&gt;show counter global filter packet-filter yes delta yes&lt;/SPAN&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt; in conjunction with filters to obtain meaningful data.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For more information, you can follow the DOC &lt;A href="https://live.paloaltonetworks.com/docs/DOC-4650"&gt;What is the Significance of Global Counters?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; You can enable FLOW BASIC feature to understand the exact reason behind the failure:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; clear all&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; set filter match source&amp;nbsp; IP_ADD_OF_THE_TESTING_PC destination IP_ADD_OF_THE_DESTINATION&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; set filter match source IP_ADD_OF_THE_DESTINATION destination&amp;nbsp; IP_ADD_OF_THE_TESTING_PC&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; set log feature flow &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;basic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; set log feature &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;tcp&lt;/SPAN&gt; all&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; set filter on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&amp;gt; &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-size: 10pt; line-height: 1.5em;"&gt;debug&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-size: 10pt; line-height: 1.5em;"&gt;dataplane&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; packet-&lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-size: 10pt; line-height: 1.5em;"&gt;diag&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; set log on&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; ~~~~~~~~~~~~~~~~ Initiate traffic through the PAN firewall/try to browse a website ~~~~~~~~~~~~~~~~~~~~~~~~~&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; set log off&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;debug&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;dataplane&lt;/SPAN&gt; packet-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;diag&lt;/SPAN&gt; aggregate-logs&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;less&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;mp&lt;/SPAN&gt;-log pan_packetdiag_log.log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For more information, you can follow the DOC: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1506"&gt;Packet Capture, Debug Flow-basic and Counter Commands&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 May 2014 17:54:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa200-stops-processing-traffic/m-p/13352#M9792</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-05-26T17:54:57Z</dc:date>
    </item>
  </channel>
</rss>

