1: Tools and Resources
2: Flow Logic
3: Packet Captures
4: Packet-Diagnostics Logs
5: Host-Inbound Traffic
6: Transit Traffic
7: System Services
8: Certificate Management and SSL Decryption
9: User-ID
10: GlobalProtect
11: Support Escalation and RMAs
12: Next Steps