Interface counters on Palo Alto firewalls provide critical insights into network traffic, errors, and packet drops. These counters help diagnose:
Use
show counter interface
to see detailed interface statistics. Below are common counters and their significance:
Counter | Description | Common Cause |
---|---|---|
rx-crc-error | CRC checksum failure on received frames | Bad cabling, EMI (electromagnetic interference), or faulty hardware |
rx-no-buffer | No buffer space available for incoming packets | High traffic volume, insufficient buffer allocation, or CPU/memory bottlenecks |
tx-fifo-error | TX queue overflow | High output traffic, or insufficient buffer size on the egress interface |
rx-align-error | Received frame with incorrect alignment | Physical layer issues, misconfigured cabling, or faulty NIC |
rx-mac-error | Invalid MAC address or corrupted frame | Physical layer issues or hardware failure |
app-incomplete | Dropped packets due to incomplete application inspection | App-Id inspection issues, session timeout, or protocol mismatch |
zone-unavailable | Packet dropped due to zone unavailability | Incorrect zone configuration or security policy mismatch |
security-policy-drop | Packet dropped due to security policy | Policy blocking traffic, or incorrect rule ordering |
buffer-full-drop | Dropped due to full buffer (often from security policy or QoS) | Excessive traffic volume, QoS limits, or security policy enforcement |
Use
show counter global
to monitor traffic drops at the data plane level. You can filter by severity or packet filtering:
show counter global filter severity drop
This command helps identify drops caused by:
security-policy-drop
).
app-incomplete
).
buffer-full-drop
).
show counter interface
| match "rx-crc|rx-align|rx-mac"
show counter global filter security-policy-drop
show counter global filter buffer-full-drop
clear counter interface
clear counter global
show security policy
to verify policy rules. Ensure rules are ordered correctly and that the correct zones are referenced.