Troubleshoot App-ID Cloud Engine
This topic provides general troubleshooting information for the App-ID Cloud Engine (ACE).
- To check if an appliance has a valid SaaS Security Inline license, run the operational CLI commandshow cloud-appid connection-to-cloud. If there is an issue, the command returns the message:ACE Error: License check failed. Check if SaaS license is installed and activeCloud connection: failedIn addition, the output shows the time of the last successful connection, for example:Last successful gRPC connection: 2021-05-20 16:00:00 -0800 PDTIf the license is installed and the connection to ACE is good, then the command returns the URL for the ACE cloud server connection and the statusCloud connection: connected, along with connection statistics and the status of the device certificate, including the certificate validity dates.
- Panorama commit all/push to managed firewalls fails. Check if any of the following conditions exist and repair them:
- Do managed firewalls have a valid SaaS Security Inline license? If not, then they do not have the ACE catalog and the commit all/push operation fails. Depending on whether you want to managed firewalls to handle ACE App-IDs, either remove the ACE objects from the pushed configuration and try again or install valid SaaS Security Inline licenses on the managed firewalls, wait for the catalog to download.There are fewer than four thousand content-provided App-IDs. After you download the ACE catalog, you see many thousands more applications on the firewall and can confirm by checkingor by using the operational CLI commandObjectsApplicationsshow cloud-appid cloud-app-data application allto see the new App-IDs.
- Has the connection between a managed firewall and ACE has gone down? Check the connection to the ACE cloud and restore the connection if necessary.The operational CLI commandshow cloud-appid connection-to-cloudprovides the cloud connection status and the ACE cloud server URL.
- The ACE catalog on Panorama and the ACE catalog on managed firewalls is out-of-sync, which results in pushed configurations that include ACE apps that are not in the firewall’s catalog. If the connection between the firewall and ACE is up, the outdated catalog will update in the next few minutes automatically and resolve the issue. (Wait five minutes and try again.)You can also run the operational CLI commanddebug cloud-appid cloud-manual-pull check-cloud-app-datato update the catalog manually.
- Are the firewalls all running PAN-OS 10.1 or later? (Pushing configurations that reference ACE applications and objects to firewalls running earlier versions than PAN-10 10.1 is not allowed.)
- In an HA pair (active/active or active/passive) that has an ACE configuration, if you run the operational commandshow session allorshow session id <id>, the output for ACE applications may show the global App-ID number instead of the application name. The firewall only shows the application name if its data plane has the cloud application data. If not, then the firewall shows the global App-ID number for the application instead.
- To reset the connection to ACE (the gRPC connection), run the operational CLI commanddebug cloud-appid reset connection-to-cloud.
- View the ACE applications downloaded to the appliance with the operational CLI commandshow cloud-appid cloud-app-data application. You can view all downloaded apps or individual apps by App-ID or application name.
- View pending requests for ACE App-IDs with the operational CLI commandshow cloud-appid signature-dp pending-request. The output includes how many times the firewall sent the request to ACE (tries). After eleven tries, the send operation times out.
- The operational CLI commandshow cloud-appidhas more useful options:admin@PAN-ACE-VM-1> show cloud-appid ? > app-objects-in-policy Show application-filter/application-groups referred in policy > app-to-filtergroup-mapping Show application to matched filter and groups > application Show Application info for UI > application-filter Show cloud apps in application-filters > application-group Show cloud apps in application-groups > cloud-app-data Show cloud application, container and metadata > connection-to-cloud Show gRPC connection status to cloud application server > ha-info Show statistics of cloud application high availability > overlap-appid Show duplicated applications in predefined content > signature-dp Show cloud signatures and applications used on DP > task Show task on management-plane > transaction Show cloud application transaction > version Show Cloud-AppID version
- To view the global counters for ACE, run the operational CLI commandshow counter global filter value all category cad(cadstands for “cloud app-identification).
- To view statistics for bytes and packets received and sent to/from shared memory and to/from the security client for services such as ACE, DLP, and IoT, run the operational commandshow ctd-agent statistics.
- If you notice a discrepancy between the number of applications that match an Application Filter when you look in the user interface versus when you look in the CLI, it’s because of the way the firewall counts matching applications in the user interfaces versus in the CLI:
For this reason, the user interface may show more matching applications than the CLI for the same Application Filter.The same thing applies to Application Groups when you look at them in the user interface versus the CLI.
- When you look at an Application Filter in, the firewall displays all of the matching applications in the ACE catalog, regardless of whether the firewall has actually seen those applications and downloaded their App-IDs, and the number count includes all of those applications.ObjectsApplication Filters
- When you look at an Application Filter in the CLI with theshow cloud-appid application-filteroperational command, the firewall only displays the number of matching applications for which the firewall has downloaded ACE App-IDs.
- ACE App-IDs are supported for Security policy only. ACE App-IDs are not supported for any other policy type.However, when you configure QoS or SD-WAN policy, ACE App-IDs are visible (able to be selected) and may be present in Application Groups or Application Filters applied to the rule, but adding them to QoS or SD-WAN policy has no effect on the application traffic. (The QoS and SD-WAN policies don’t control the application traffic.)
Recommended For You
Recommended videos not found.