- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
07-31-2020 02:13 AM
network flow
Lan Network -->Firewall A----->switch -->-Firewall B ---->Internet-------->Database server
We are facing issue to connect database server from our lan network.
We took packet capture on Firewall A and firewall B .
When we initiate traffic from LAN network to database server:
Firewall B ; We are getting client Hello and server hello message on Firewall B
Firewall A: Only client hello message we got means server hello message drop by firewall A
that why we could not able to connect with database server.
We are not using any decryption and proxy we have checked counter value also we did not get any drop.
traffic monitor logs session end reason: TCP-rst by client
@ MP18
@ Reaper
07-31-2020 01:49 PM
Hi @bit_byte
Is the assumption correct, that both firewalls are paloalto firewalls?
Anyway, when you say "Firewall A: Only client hello message we got means server hello message drop by firewall A", does this really mean the server hello is dropped by firewall A or isn't there any server hello on firewall A which would mean that the server hello is dropped by firewall B.
08-01-2020 01:09 AM
Yes, both firewalls are PA.
We have already bypass firewall A and we did the test from the switch then we can able to connect with the database server.
That means Lan pc did not get server hello that why TLS connection would not able to establish.
08-01-2020 01:25 AM
@bit_byte So when you did a packet capture, was the server hello in the drop stage of the capture? How does the session look like in the traffic log? Did you try a packet log debug via cli and checked the global counters when testing the connection?
08-02-2020 09:15 AM - edited 08-02-2020 09:17 AM
Are both firewalls have same model and same PAN OS?
Check the security policy on Firewall A and B and compare them?
Make sure they are similar in security profiles.
Look for threat logs in Firewall A if any traffic is denied there?
When you did packet capture do you see any drops on firewall A and B?
Use this command test security policy on both Firewall A and B
Also as Remo mentioned when you do the pcap check global counters on both Firewalls and look for drops?
Regards
08-26-2021 10:14 AM - edited 08-26-2021 06:57 PM
Hi @bit_byte
Did you solve this problem. We are facing similar issue.
Our environment
client->palo alto->f5 reverseproxy->webapp server
Observation
We could notice that the f5 is receiving client-hello and it is responding with server hello. A PCap at the PA shows that the server hello is recd. But a packet capture at the client shows no server-hello message. There is no specific change we did in the environment and suddenly this issue has cropped up.
When we bypassed firewall and routed the traffic directly from Client to f5, the web page loads properly.
Regards
Kanthanathan
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!