SD-WAN Issue: Some Traffic Not Matching the Expected Policy

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

SD-WAN Issue: Some Traffic Not Matching the Expected Policy

L1 Bithead

Hello everyone,

I’m facing an issue with Palo Alto SD-WAN on Panorama (FW PA-1440).

I created an SD-WAN rule to direct traffic for the ms-update application through a specific WAN link. However, when I check the traffic monitor using an ms-update filter, I notice that some packets match the "unmatched session" policy, while others correctly match my "Update Microsoft" policy.

Could someone explain why this is happening or guide me on how to debug this issue?

Thanks in advance!

Best regards,

5 REPLIES 5

L4 Transporter

Hello @R.BONY ,

 

Please keep in mind App-ID requires some packets before the identification is accurate.

If you want to confirm that is the cause, you can set the logging at start (for the policies which may allow the initial packet), then in the traffic logs, for a ms-update ended session, you search the corresponding start log to see what app-id that was.

 

Olivier

PCSNE - CISSP

Best Effort contributor

Check out our PANCast Channel

Disclaimer : All messages are my personal ones and do not represent my company's view in any way.

Thanks for the reply,

I set logging at the start, and the traffic logs look fine they match "ms-update" at the beginning.

This is very strange because, in the Session Browser, the Palo Alto firewall identifies the traffic as "ms-update," and the egress interface is my SD-WAN interface. However, it does not apply my SD-WAN policy as expected.

 

 

Hello all,

Has anyone managed to get SD-WAN traffic working with the application tag 'ms-update'?

I still don't understand why the rule isn't matching. Maybe I should work with a rule based on the IP instead of the application?

 

regards

 

 

L0 Member

Having the same problem here with ms-update app and even with O365 tagged apps. I have a pair of SD-WAN policies pointing to Prisma tunnels and DIA links respectively and I want to steer traffic from some MSF apps to the former ones and sometimes it does it the right way, other times not, even recognizing the same app....Not understanding the reason of that behaviour.

L0 Member

I'm having the same problem. Based on the traffic log I can see sessions without any SDWAN policy, empty value on that field.
Traffic applications are more than one, like ssl, quic or ms-office365-base and sessions are with KBs of traffic (so enough traffic passed on the firewall) and session end reason is TCP-FIN.
How that is possible? 
I have at the bottom a CatchALL SDWAN policy that MUST match ALL traffic.

  • 1859 Views
  • 5 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!