The same traffic is getting allowed by one rule and blocked in firewall by another (please refer scrnshot)

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

The same traffic is getting allowed by one rule and blocked in firewall by another (please refer scrnshot)

L1 Bithead

So we have a explicit Deny all rule at the bottom most, and there is another rule by which the same traffic is also getting allowed.

The allowed rule has dest as any and has URL category in it with service as https.

 

So if u can see the screenshot same traffic is getting blocked by bottom most Deny ALL and allowed by the <Int prod to lambda URL> rule

 

Only difference is the Action source, for denied traffic it is "from application" and for allowed traffic "from-policy"

 

Kindly let me know why the same traffic is getting allowed by 1 rule and blocked by other. 

 

 

4 REPLIES 4

L1 Bithead

JubairJunaid_0-1747658545686.png

 

Cyber Elite
Cyber Elite

You are logging session beginning and end.

First firewall needs to let through TCP 3way handshake.

After that it identifies real application and if that application is not in the policy then Palo starts looking for following rules below.

 

Usually you want to enable logging at session beginning only during troubleshooting sessions.

 

Raido_Rattameister_0-1747675288685.png

 

Principal Architect @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

Thanks, I will try that, but will it resolve the issue or just give me the correct logs ?
Wont enabling Log at session start cause more load to cpu for the explicit Deny rule.

Cyber Elite
Cyber Elite

"Thanks, I will try that, but will it resolve the issue or just give me the correct logs ?"

In initial post you mentioned that rule that permits traffic has URL category in it.

Thing is that Palo can't identify URL category based on first packet.

Assuming that traffic is pure HTTP then Palo can identify application based on 5th packet (in case of HTTPS URL is retrieved from SNI on the cert).

SYN (client to server)
SYN ACK (server to client)
ACK (client to server)
HTTP GET (client to server)

WEBSITE DATA BACK TO THE CLIENT <<< this is where Palo identifies traffic as web-browsing. (server to client)

 

So initial 4 packets need to be permitted through by some rule and in your case you see it in logs because you have log at session start checked.

 

If you don't want initial TCP 3way handshake to match some random rule you can add before any outgoing rule this nonsense rule that in reality would never permit pings (because ping is ICMP protocol) but it would log all TCP 3way handshakes under single rule name so you can run reports against it etc as needed.

Adjust it according to your needs as it is very broad permitting outgoing SYN sent on any port (you might want to limit it to 80 and 443).

 

Raido_Rattameister_0-1747831647909.png

 

 

"Wont enabling Log at session start cause more load to cpu for the explicit Deny rule."

You already have log at session start checked. You need to uncheck it to see logs  correctly.

I assume it based on session end reason being "n/a" for those logs.

 

 

Principal Architect @ Cloud Carib Ltd
Palo Alto Networks certified from 2011
  • 588 Views
  • 4 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!