How to decode palo alto netflow app-id from hex value

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

How to decode palo alto netflow app-id from hex value

L2 Linker

Hi,
I am sending Palo alto netflow to a Linux server. While I capture NetFlow from the server and open it on Wireshark I cannot see appid in plain text format. I only see the hex code. I have attached some screenshot below here.

ssovee_0-1699418558527.pngssovee_1-1699418578215.pngssovee_2-1699418616114.png

Is there any way to decode this hex code to a plain text app-id?

 

1 REPLY 1

Hi @ssovee ,

As mentioned here https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/monitoring/netflow-monitoring/configure-ne... PAN firewall will refresh NetFlow template based on the time interval you specified in the NetFlow server profile.

 

From your screenshare it looks like PAN firewall is already configured to send PAN-OS specific fields, which include App-ID. However wireshark is unable to recognize this field, and suspect the reason for that is your capture didn't capture NetFlow Template packet sent from the firewall.

You can see example here, how WireShark is able to identify all fields when template is being captured - https://helpdesk.kaseya.com/hc/en-gb/articles/115003522631-How-to-view-NetFlow-in-WireShark

 

  • 922 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!