certain tcp traffic not showing at the Azure palo alto firewall

Vanessa Xu 0 Reputation points
2024-02-27T19:55:23.74+00:00

Certain TCP traffic not showing at the Azure Palo firewalls. There are tcp traffic from on-prem to Azure test subnet vm.

The connection path is as below: on-prem user laptop -> onprem palo fw -> express route ->Azure Palo fw -> test vm. There is no NSG on any of the interfaces at Azure side. The RDP traffic from the on-prem user laptop can reach the test vm no problem (tcp 3389). The smb (i.e. TCP 139) traffic from the on-prem user laptop can only shown at the on-prem fw log, showing it was allowed and went out the same path to the express route, but timeout status.

The smb traffic is not showing at the Azure palo fw. ( why the smb traffic disappeared after existing the on-prem fw?) The only difference is the on-prem laptop (prd domain) and the azure vm (test domain) belong to different AD domain controllers, with the same domain name.

No drop packets on either palo fw.

Azure ExpressRoute
Azure ExpressRoute
An Azure service that provides private connections between Azure datacenters and infrastructure, either on premises or in a colocation environment.
323 questions
{count} votes