All UDP sessions will show their session end reason as "Aged Out" if the traffic is allowed through the firewall. UDP doesn't have a concept of an explicit close, so if it's not dropped because of a threat or policy deny, "aged out" is the only possible end reason. That much is common, you won't have to worry about that. As for the application showing "Insufficient-data", that just means that not enough packets have been seen by the firewall to accurately identify the app itself. Take a look at the session output from the CLI (show session id 12345678). You should see the client-to-server (c2s) and reverse (s2c) flows which will show your IPs as well. Check to ensure that the correct NAT addresses (if needed) and make sure that the firewall's routing table (show routing route) is correct to be able to route the traffic in both directions. If you'd like, paste the result of one of those aged out sessions here. Also, hit the "insert code" icon, you can paste the results in a cleaner format for viewing on these forums, like below. Here's an example I took from my own firewall that has the same details (IPs changed for privacy). You can see that only 1 packet in each direction was seen, which wasn't enough to identify the application. The end reason is also aged-out, because it's UDP (protocol 17): > show session id 13736
Session 13736
c2s flow:
source: 192.168.1.1 [Trust]
dst: 1.2.3.4
proto: 17
sport: 32047 dport: 8814
state: INIT type: FLOW
src user: unknown
dst user: unknown
qos node: ethernet1/1, qos member N/A Qid 0
s2c flow:
source: 1.2.3.4 [Internet]
dst: 123.222.111.333
proto: 17
sport: 8814 dport: 29065
state: INIT type: FLOW
src user: unknown
dst user: unknown
start time : Tue Jan 15 13:22:33 2019
timeout : 30 sec
total byte count(c2s) : 201
total byte count(s2c) : 219
layer7 packet count(c2s) : 1
layer7 packet count(s2c) : 1
vsys : vsys1
application : insufficient-data (insufficient)
rule : Exclude Logging
service timeout override(index) : False
session to be logged at end : False
session in session ager : False
session updated by HA peer : False
address/port translation : source
nat-rule : Default Outbound NAT(vsys1)
layer7 processing : enabled
URL filtering enabled : True
URL category : any
session via syn-cookies : False
session terminated on host : False
session traverses tunnel : False
captive portal session : False
ingress interface : ethernet1/2
egress interface : ethernet1/1
session QoS rule : N/A (class 4)
end-reason : aged-out
... View more