- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
02-27-2024 12:01 PM
Certain TCP traffic not showing at the Azure Palo firewalls.
There are tcp traffic from on-prem to Azure test subnet vm.
The connection path is as below: on-prem user laptop -> onprem palo fw -> express route ->Azure Palo fw -> test vm.
There is no NSG on any of the interfaces at Azure side.
The RDP traffic from the on-prem user laptop can reach the test vm no problem (tcp 3389).
The smb (i.e. TCP 139) traffic from the on-prem user laptop can only shown at the on-prem fw log, showing it was allowed and went out the same path to the express route, but timeout status.
The smb traffic is not showing at the Azure palo fw. ( why the smb traffic disappeared after existing the on-prem fw?)
The only difference is the on-prem laptop (prd domain) and the azure vm (test domain) belong to different AD domain controllers, with the same domain name.
No drop packets on either palo fw.
02-28-2024 04:17 AM
Hi @Vanessaxu ,
Is the traffic actually reaching the Azure fw or is it going lost in transit ? Can you check with a PCAP ?
Have you checked the global counters ? There might be drops there that don't show up in traffic log.
How to check global counters for a specific source and destination IP address
Kind regards,
-Kim.
03-22-2024 12:24 PM
did a pcap, can't see the traffic incoming either.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!