Scenario:
An administrator configured a File Blocking profile with action set to "Block" and applied it to a Security Policy rule. A Linux command-line user reports that their download of a
.tar
file is failing, but they see no error message in their terminal.
Question: Where should the administrator look in the firewall logs to verify if the File Blocking profile is the cause?
✅ Correct Answer: Data Filtering log
Palo Alto Networks firewalls categorize different types of security events into specific logs for easier analysis. When troubleshooting issues related to files being blocked based on their type (as configured in a File Blocking profile), the correct log to examine is the Data Filtering log .
The Data Filtering log specifically records events related to:
When a file transfer matches a File Blocking profile rule with the action set to "Block", an entry will be generated in the Data Filtering log detailing:
Why no user error? When the File Blocking action is set to "Block" (and a custom block page isn't configured or applicable, like for a CLI download), the firewall simply drops the packets associated with the file transfer. This often results in the client-side application (like `wget` or `curl` on Linux) eventually timing out or failing without receiving a specific "blocked by firewall" error message.
Therefore, the Data Filtering log is the definitive place to confirm if a File Blocking profile is responsible for preventing a file download.