- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
01-24-2026 10:07 PM
I have a rule in Palo Alto PA 440 running 11.2.6 to allow 'any' to Azure AD. I see only DNS responses from Azure AD. For ping and LDAP packets received is zero. The traffic is hitting the right rule though. I did a packet capture I don't see ping request on the transmit stage on the firewall. Ping and LDAP working from another site. How do I fix this.
01-25-2026 08:53 PM
First, verify the routing to ensure there is no asymmetric routing in the network.
You can identify the correct egress interface for the traffic using the following command:
test routing fib-lookup virtual-router default ip 8.8.8.8
If the monitor logs show 0 bytes for return traffic, it likely indicates that the return path is taking a different route. Do you see any drops in packet capture?
01-26-2026 07:15 AM
There are no drops and 0 bytes for return traffic
01-26-2026 07:43 AM
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!

