Hi, Even though you have 17000 DNS packet, I assume source port is sequence or randomized so it should be possible to match pcap and traffic log? Were you not able to identify which traffic log was made with which pcap? You can use filter on GUI like following. ( port.src eq xxx ) and ( port.dst eq 53 ) and ( app eq dns ) There is filter function on CLI as well. admin@PA-200> show log traffic + action action + app app + csv-output csv-output + direction direction + dport dport + dst dst + dstuser dstuser + end-time end-time + from from + query query + receive_time receive_time + rule rule + sport sport + src src + srcuser srcuser + start-time start-time + to to | Pipe through a command <Enter> Finish input I hope this helps.
... View more