How To Troubleshoot Connection Failures Between Firewall And Log Collector

How To Troubleshoot Connection Failures Between Firewall And Log Collector

49091
Created On 02/10/22 18:09 PM - Last Modified 11/14/23 17:35 PM


Objective


Troubleshoot Connection Failures Between Firewall And Log Collector

Environment


  • Firewall
  • Log collector


Procedure


  1. On the Firewall, check the Service Route to the Log Collector
Device > Setup > Services > Service Route Configuration > click Customize > Panorama
  1. If Service Route is set to "Use Management Interface for all" or "Use Default" then from the firewall CLI:
    1. Check IP connection between firewall and the log collector (LC).
ping host <IP address of LC>
If ping is successful then proceed to (b) otherwise check physical layer1 and data link layer2 on your network.
  1. Perform a traceroute check to the log collector:
    traceroute host <IP address of the LC>
    Similarly perform a traceroute check from the CLI of the log collector to the Management IP address of the firewall.
  2. Check TCP connection between firewall and the log collector.
show netstat numeric-host yes numeric-port yes all yes | match 3978

Connection should show established if not then.

  1. Check Permitted IP Address (Device > Setup> Interfaces > click Management > Permitted IP Addresses)
If a list of IP exist then make sure that Log collector IP address is present in that list.
  1. Perform a tcpdump on the firewall management interface.
tcpdump filter "port 3978" snaplen 0
  1. Export the tcpdump packet capture to a scp or tftp server and analyze it to root cause the connection issue between firewall and log collector.
scp export mgmt-pcap from mgmt.pcap to username@host:path
  1. If service route is dataplane interface then from the firewall CLI:
    1. Check IP connection between firewall dataplane interface and the log collector (LC).
      ping source <IP address of the dataplane interface> host <IP address of LC>
      If ping is successful then proceed to b otherwise check physical layer1 and data link layer2 on your network.
    2. Perform a traceroute check to the log collector:
      traceroute source <IP address of the dataplane interface> host <IP address of the LC>
      Similarly perform a traceroute check from the CLI of the log collector to the IP address of the dataplane of the firewall.
    3. Check TCP connection between firewall and the log collector by performing a packet capture on the dataplane using GUI.
Check knowledge base Getting Started: Packet Capture
  1. Check the session details on the firewall CLI.
    show session all filter source <IP address of the dataplane interface> destination <IP address of the LC>
    Session should show active if discarded then check the firewall's related security policy, nat and routing.
 
  1. If above checks are done then check if any firewall or device in your network is blocking this connection.


Additional Information


HOW TO VERIFY IF SERVICE ROUTES ARE CORRECTLY INSTALLED IN MANAGEMENT PLANE
Troubleshooting Panorama Connectivity

 


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004NBLCA2&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language