- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
In case you missed it: In early December, there was a Fuel workshop on Advanced Data Plane Troubleshooting for Palo Alto Networks practitioners, hosted by Arun Sharma, Senior Technical Support Engineer. Watch the videos below to learn about identifying and resolving common data plane issues in NGFWs
In part one of four, Arun Sharma introduces us how to do advanced troubleshooting of the data plane in a next generation firewall (NGFW). During this first video, he goes into collecting basic data as well as how important it is to have correct port and application configuration in your policies.
In part two of four, Arun Sharma continues to show us how to perform advanced troubleshooting of the data plane in a NGFW. During this second video, Arun goes into details about the Session Browser, why sessions may have no logs to them, and then spends a good amount of time on data plane counters. After that, we get an introduction to PCAPS and packet diagnostics.
In part three of four, Arun Sharma expands on the process of working with PCAPs and packet analysis by going into what information is available at the debug level of logs. With flow basic feature, Arun explains how it can be used, but warns about how CPU intensive it can be, so use flow basic with caution.
In the final of four parts, Arun Sharma wraps everything up with how to handle issues with high data plane CPU consumption. He goes over what it means, how to debug the issue, and then wraps up by explaining how high buffer and descriptor usage can cause problems even if the data plane CPU isn't being completely consumed.
Join the Next Spark event — Become a Fuel Member Today!
Becoming a member of the Fuel User Group is a great way for individuals and organizations using Palo Alto Networks products and services to get access to a wealth of resources — knowledge, training, virtual test labs, networking opportunities, and tools which can significantly improve proficiency and effectiveness in cybersecurity and IT operations. As a reminder, membership is free!
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Subject | Likes |
---|---|
5 Likes | |
3 Likes | |
3 Likes | |
2 Likes | |
2 Likes |
User | Likes Count |
---|---|
11 | |
3 | |
3 | |
2 | |
2 |