- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
07-19-2019 11:36 AM
Hi All,
We recently add palo alto firewall to the customer as 2nd layer firewall - 2PA820 and 1 Hyper-V panorama.
Panorama is in panorama mode and we use it for log collector and management the firewall.
Now, we have a weird issue that in panorama, we don't see any deny or drop traffic and firewall itself has deny and drop traffic.
we are running base version 9.0.0 on panorama with 2TB virtual disk add-on.
Was wondering any one has same issue as we have and any solution for this?
07-19-2019 12:38 PM
Hi All,
Never mind this post.
It was my stupid mistake that not configure LogForwarding on the default security rule. Now it is all good.
07-19-2019 12:38 PM
Hi All,
Never mind this post.
It was my stupid mistake that not configure LogForwarding on the default security rule. Now it is all good.
07-21-2019 07:59 AM
Thanks for letting us know
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!