<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									View session table to confirm if traffic hit the policy in paloalto firewall via CLI - Paloalto Firewall				            </title>
            <link>https://www.hacktheforum.com/paloalto-firewall/view-session-table-to-confirm-if-traffic-hit-the-policy-in-paloalto-firewall-via-cli/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Sat, 16 May 2026 23:11:11 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>View session table to confirm if traffic hit the policy in paloalto firewall via CLI</title>
                        <link>https://www.hacktheforum.com/paloalto-firewall/view-session-table-to-confirm-if-traffic-hit-the-policy-in-paloalto-firewall-via-cli/#post-19903</link>
                        <pubDate>Mon, 27 Oct 2025 17:34:38 +0000</pubDate>
                        <description><![CDATA[show session all filter ...
This command filters the session table (active traffic sessions) and shows details including:


Source/Destination IP &amp; port


Application, protocol, a...]]></description>
                        <content:encoded><![CDATA[<h3 data-start="432" data-end="468"> </h3>
<h3 data-start="432" data-end="468"><code data-start="439" data-end="468">show session all filter ...</code></h3>
<p data-start="469" data-end="566">This command filters the <strong data-start="494" data-end="511">session table</strong> (active traffic sessions) and shows details including:</p>
<ul data-start="567" data-end="679">
<li data-start="567" data-end="599">
<p data-start="569" data-end="599">Source/Destination IP &amp; port</p>
</li>
<li data-start="600" data-end="637">
<p data-start="602" data-end="637">Application, protocol, and action</p>
</li>
<li data-start="638" data-end="679">
<p data-start="640" data-end="679">Security policy name that was matched</p>
</li>
</ul>
<pre contenteditable="false">&gt; show session all filter source &lt;source-ip&gt; destination &lt;destination-ip&gt;
</pre>
<p data-start="790" data-end="835">You can add optional filters for fine-tuning:</p>
<div class="contain-inline-size rounded-2xl relative bg-token-sidebar-surface-primary">
<div class="overflow-y-auto p-4" dir="ltr"><code class="whitespace-pre! language-bash"><code class="whitespace-pre! language-bash"><span></span></code></code>
<pre contenteditable="false">&gt; show session all filter source &lt;src-ip&gt; destination &lt;dst-ip&gt; destination-port &lt;port&gt;
&gt; show session all filter application &lt;app-name&gt;
&gt; show session all filter rule &lt;rule-name&gt;
</pre>
<p> </p>
</div>
</div>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/paloalto-firewall/">Paloalto Firewall</category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/paloalto-firewall/view-session-table-to-confirm-if-traffic-hit-the-policy-in-paloalto-firewall-via-cli/#post-19903</guid>
                    </item>
							        </channel>
        </rss>
		