98.1 98 Packet Capture
98.1 98 Packet Capture
o All Palo Alto Networks firewalls have a built-in packet capture (pcap) feature to use.
o You can use to capture packets that traverse the network interfaces on the firewall.
o You can the Packet Capture then use the captured data for troubleshooting purposes.
o The packet capture feature is CPU-intensive and can degrade the firewall performance.
o Only use this feature when necessary & turn it off after you collect the required packets.
o Configure Palo Alto Firewall to perform custom packet capture or a threat packet capture.
o Packet captures are session based, so single filter is capable of capturing both C2S & S2C.
o Packets are captured on the Palo Alto Network Firewall dataplane vs on the interface only.
o Pre-Parse Match is feature that capture all files before processed by engines on dataplane.
o When filtering is enabled, new sessions are marked for filtering and captured not existing.
Options Description
Manage Filters When enabling custom packet captures, you should define filters so that
only the packets that match the filters are captured. This will make it
easier to locate the information need in the pcaps and will reduce the
processing power required by the firewall to perform the packet capture.
Filtering After defining filters, set the Filtering to ON. If filtering is OFF, then all the
traffic is captured.
Pre-Parse Match After a packet enters the ingress port, it proceeds through several
processing steps before it is parsed for matches against pre-configured
filters. Set the Pre-Parse Match setting to ON to emulate a positive match
for every packet entering the system.
Packet Capture Click the toggle switch to turn packet capture ON or OFF.
Clear All Settings Click Clear All Settings to turn off packet capture and to clear all packet
capture settings.
Captured Files Contains a list of custom packet captures previously generated by the
firewall. Click a file to download it to your computer. To delete a packet
capture, select the packet capture and then Delete it.
Stages Description
Drop This is the stage where you will simply see Dropped packets. Stage is where
packets get discarded. The reasons may vary.
Receive This is the packet as it hits the firewall, so Inbound. The packets as they ingress
the firewall before they go into the firewall engine. When NAT is configured, these
packets will be pre-NAT.
Transmit This is as the packet is leaving the firewall and a good stage to see the packets
leaving the firewall. Stage captures packets how they egress out of the firewall
engine. If NAT is configured, these will be post-NAT.
Firewall This is as the packet is inspected against policy. Stage captures packets in the
firewall stage.
Browse to Monitoring > Packet Capture. Create and manage Packet Capture Filter.
Options Description
Id Enter or select an identifier for the filter.
Ingress Interface Select the ingress interface on which you want to capture traffic.
Source Specify the source IP address of the traffic to capture.
Destination Specify the destination IP address of the traffic to capture.
Src Port Specify the source port of the traffic to capture.
Dest Port Specify the destination port of the traffic to capture.
Proto Specify the protocol number to filter (1-255). For example, ICMP is
protocol number 1.
Non-IP Choose how to treat non-IP traffic (exclude all IP traffic, include all IP
traffic, include only IP traffic, or do not include an IP filter).
IPv6 Select this option to include IPv6 packets in the filter.
Enable a Packet Filter drag to On the Filtering it will show ON Blue color.
Enable Packet Captures Drag the slide to ON which show in Blue Color.
Open the downloaded Packet Captures in Wireshark, go to file click on merge to combine all
the downloaded captured files such as Receive, transmit and Firewall.
Clear All Packet Captures setting just click on Clear All Settings.