- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
05-19-2025 05:41 AM
So we have a explicit Deny all rule at the bottom most, and there is another rule by which the same traffic is also getting allowed.
The allowed rule has dest as any and has URL category in it with service as https.
So if u can see the screenshot same traffic is getting blocked by bottom most Deny ALL and allowed by the <Int prod to lambda URL> rule
Only difference is the Action source, for denied traffic it is "from application" and for allowed traffic "from-policy"
Kindly let me know why the same traffic is getting allowed by 1 rule and blocked by other.
05-19-2025 10:21 AM
You are logging session beginning and end.
First firewall needs to let through TCP 3way handshake.
After that it identifies real application and if that application is not in the policy then Palo starts looking for following rules below.
Usually you want to enable logging at session beginning only during troubleshooting sessions.
05-21-2025 02:09 AM
Thanks, I will try that, but will it resolve the issue or just give me the correct logs ?
Wont enabling Log at session start cause more load to cpu for the explicit Deny rule.
05-21-2025 05:50 AM - edited 05-21-2025 05:54 AM
"Thanks, I will try that, but will it resolve the issue or just give me the correct logs ?"
In initial post you mentioned that rule that permits traffic has URL category in it.
Thing is that Palo can't identify URL category based on first packet.
Assuming that traffic is pure HTTP then Palo can identify application based on 5th packet (in case of HTTPS URL is retrieved from SNI on the cert).
SYN (client to server)
SYN ACK (server to client)
ACK (client to server)
HTTP GET (client to server)
WEBSITE DATA BACK TO THE CLIENT <<< this is where Palo identifies traffic as web-browsing. (server to client)
So initial 4 packets need to be permitted through by some rule and in your case you see it in logs because you have log at session start checked.
If you don't want initial TCP 3way handshake to match some random rule you can add before any outgoing rule this nonsense rule that in reality would never permit pings (because ping is ICMP protocol) but it would log all TCP 3way handshakes under single rule name so you can run reports against it etc as needed.
Adjust it according to your needs as it is very broad permitting outgoing SYN sent on any port (you might want to limit it to 80 and 443).
"Wont enabling Log at session start cause more load to cpu for the explicit Deny rule."
You already have log at session start checked. You need to uncheck it to see logs correctly.
I assume it based on session end reason being "n/a" for those logs.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!