Details
Session start logs are generated on the first data packet and not right after the three-way handshake. For example, if the security policy has logging at session start only and it establishes the three-way handshake between the client and server, and does not send any data, the session will exist on the Palo Alto Networks firewall, but the traffic logs will not have a corresponding log entry. The user will need to push some data through the connection before the session start log will show up.
The following are four tested scenarios:
Scenario 1
Policy set for logging at session start only
Telnet to a destination host at a higher port 13050. (Do not pass packets through the established telnet session, only establish the three-way handshake)
- Check for the established session on the firewall (User will see a session dport: 13050 as active, and only 3 packets can be seen at that time)
- Check Monitor > Logs > Traffic. (The user will not find any log for that session, because no data has been passed yet)
Scenario 2
Policy set for logging at session start only
Telnet to a destination host at a higher port 13050 and PASS packets through that session
- Check for the sessions on the firewall . (User will see a session dport: 13050 as active, and more than three-packets can be seen at that time)
- No traffic log for the handshake. The moment traffic passes it creates a log.
Scenario 3
Policy set for logging at session start and session end
Telnet to a destination host at a higher port 13050. (Do not pass packets through the established telnet session, only establish the three-way handshake)
- Check for the established session on the firewall (User will see a session dport: 13050 as active, and only 3 packets can be seen at that time)
- Check monitor > Logs > Traffic. (The user will not find any log for that session, because no data has been passed yet)
- Pass some characters/packets through that session and let it time out or kill the telnet session. User will see a 'start' log and 'end' log.
Scenario 4
Policy set for logging at session end only
Telnet to a destination host at a higher port 13050. (Do not pass packets through the established telnet session. Only three-way handshake)
- Check for the sessions on the firewall. (User will see a session dport: 13050 as active , only 3 packets can be seen at that time, which is obvious)
- Kill the session. (CTRL + C ). The traffic log for the session can be seen of the TYPE= END
owner: pmak