When examining traffic logs on a Palo Alto Networks firewall, the "Session End Reason" column provides vital information about why a particular network session terminated. Correctly interpreting reasons like
incomplete
,
unknown-tcp
, and
unknown-udp
is essential for effective network troubleshooting and security analysis.
This session end reason applies only to TCP traffic . It signifies that the firewall observed the beginning of a TCP connection attempt (usually the initial SYN packet), but the full three-way handshake (SYN, SYN/ACK, ACK) did not complete successfully from the firewall's perspective.
incomplete
.
This reason applies
only to TCP traffic
. It indicates that the
TCP three-way handshake completed successfully
(the firewall saw SYN, SYN/ACK, and ACK), establishing a session. However, the session later terminated in a way that was not a graceful TCP close (FIN/ACK exchange) and wasn't simply due to aging out from inactivity (which is usually logged as
aged-out
).
Most commonly, this means the firewall observed a TCP Reset (RST) packet ending the session, or the session timed out unexpectedly after the handshake.
unknown-tcp
. However,
aged-out
is the more specific reason for simple inactivity timeouts.
unknown-tcp
.
This reason applies to connectionless protocols, primarily UDP and often ICMP as well. Since these protocols lack a formal handshake or closing procedure like TCP, this reason signifies that the firewall created a session based on the initial packet(s) but subsequently stopped seeing traffic matching that session within the configured UDP (or ICMP) inactivity timeout period . The session simply expired.
unknown-udp
.
unknown-udp
.
incomplete
: TCP handshake
failed
to complete.
unknown-tcp
: TCP handshake
succeeded
, but session ended abruptly (often RST) or timed out unexpectedly post-handshake.
unknown-udp
: UDP (or ICMP) session
timed out
due to inactivity (often normal behavior).