🔧 Protocol Protection Troubleshooting Guide

1. Understanding Protocol Protection

Protocol Protection in Palo Alto Networks firewalls defends against non-IP protocol-based attacks by allowing or blocking specific Layer 2 protocols between security zones. This feature is particularly useful in environments utilizing Layer 2 VLANs or virtual wire deployments.

You can configure Protocol Protection using either an Include List (allow only specified protocols) or an Exclude List (block specified protocols). Each list supports up to 64 Ethertype entries, identified by their IEEE hexadecimal Ethertype codes.

For more details, refer to the official documentation: Protocol Protection - Palo Alto Networks .

2. CLI Commands for Troubleshooting

3. GUI Methods for Troubleshooting

  1. Monitor Threat Logs:

    Navigate to Monitor > Logs > Threat .

    Apply the following filter to view protocol protection events:

    ( subtype eq 'packet' )

    This displays logs where packet-based attack protection mechanisms, including Protocol Protection, were triggered.

  2. Review Zone Protection Profile Settings:

    Navigate to Network > Network Profiles > Zone Protection .

    Select the relevant profile and review the Protocol Protection settings to ensure appropriate protocols are allowed or blocked.

4. Additional Resources