- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
11-25-2021 02:16 AM
Hello all,
I have an issue with the DHCP.
I have DHCP relay configured on the device (PA820), remote windows server, connectivity and policy permitting DHCP traffic.
The problem is that the traffic is sill dropped by the FW, classified as not applicable.
Can someone advice ? Thank you in advance!
11-25-2021 02:33 PM
Keep in mind that DHCP is a conversation that happens before there is an IP address assigned, so the concept of a session might be different. I have not tested this on Palo myself. Maybe add both zones on the source and dest. My experience was Cisco ISR ACL and that was quite interesting.
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFXCA0
11-25-2021 03:44 PM
The traffic on the firewall will simply look like the client is communicating directly to the DHCP host that you have setup as the relay target, so make sure that you are actually allowing the traffic properly in your rulebase. Use the 'test security-policy-match' command to verify that you actually have the security rulebase entry built out properly.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!