Hulk is correct where the ACC will show you active sessions information and the traffic log will only show traffic information based on security rule log at start or end(default)?
So you would not see logs in traffic till session ends(tunnel goes down).
Following document explains better what you are seeing.
To determine what source/destination is causing traffic would need to look at ACC with source/destination zone for VPN at times you are seeing spike in traffic.
Session type "TUNN" indicates an IPSec tunnel session. As soon as you will configure a VPN tunnel, the PAN firewall will assume a tunnel session for that address.
Thanks guys. This clarifies a lot.
One more question. When you say the tunnel going down to see the traffic do you mean completely down or does the Palo count the rekey as the tunnel going down even though it is just a moment or two?
While it will be completely down. Rekey is a part of the IPSec algorithm, hence it would not be considered for session end ( according to my understanding:smileyhappy: ).
Rekey takes hardly couple of second, which will not turn down IPsec Session. Hence its not considered to be tunnel down.
Tunnel down means firewall has Network or Transport layer issues to reach peer or no interesting traffic for long time.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!