...
- Select .
- Click Add and enter a Name for the profile.
- If the firewall has more than one virtual system (vsys), select the Location (vsys or Shared) where this profile is available.
- For each syslog server, click Add and enter the information that the firewall requires to connect to it:
- Name—Unique name for the server profile.
- Syslog Server—IP address or fully qualified domain name (FQDN) of the syslog server.
- Transport—Select TCP, UDP, or SSL (TLS) as the protocol for communicating with the syslog server. For SSL, the firewall supports only TLSv1.2.
- Port—The port number on which to send syslog messages (default is UDP on port 514); you must use the same port number on the firewall and the syslog server.
- Format—Select the syslog message format to use: BSD (the default) or IETF. Traditionally, BSD format is over UDP and IETF format is over TCP or SSL/TLS.
- Facility—Select a syslog standard value (default is LOG_USER) to calculate the priority (PRI) field in your syslog server implementation. Select the value that maps to how you use the PRI field to manage your syslog messages.
- (Optional) To customize the format of the syslog messages that the firewall sends, select the Custom Log Format tab. For details on how to create custom formats for the various log types, refer to the Common Event Format Configuration Guide .
- Click OK to save the server profile.
...
- See Step Create a Log Forwarding profile.
- Select , click Add, and enter a Name to identify the profile.
- For each log type and each severity level or WildFire verdict, select the Syslog server profile and click OK.
- See Step Assign the Log Forwarding profile to policy rules and network zones.
...
- Select .
- For System and Correlation logs, click each Severity level, select the Syslog server profile, and click OK.
- For Config, HIP Match, and Correlation logs, edit the section, select the Syslog server profile, and click OK.
...
- Select and edit the Logging and Reporting Settings.
- Select the Log Export and Reporting tab and select the Syslog HOSTNAME Format:
- FQDN (default)—Concatenates the hostname and domain name defined on the sending firewall.
- hostname—Uses the hostname defined on the sending firewall.
- ipv4-address—Uses the IPv4 address of the firewall interface used to send logs. By default, this is the MGT interface.
- ipv6-address—Uses the IPv6 address of the firewall interface used to send logs. By default, this is the MGT interface.
- none—Leaves the hostname field unconfigured on the firewall. There is no identifier for the firewall that sent the logs.
- Click OK to save your changes.
...
- The private key must be available on the sending firewall; the keys can’t reside on a Hardware Security Module (HSM).
- The subject and the issuer for the certificate must not be identical.
- The syslog server and the sending firewall must have certificates that the same trusted certificate authority (CA) signed. Alternatively, you can generate a self-signed certificate on the firewall, export the certificate from the firewall, and import it in to the syslog server.
- Select and click Generate.
- Enter a Name for the certificate.
- In the Common Name field, enter the IP address of the firewall sending logs to the syslog server.
- In Signed by, select the trusted CA or the self-signed CA that the syslog server and the sending firewall both trust.The certificate can’t be a Certificate Authority nor an External Authority (certificate signing request [CSR]).
- Click Generate. The firewall generates the certificate and key pair.
- Click the certificate Name to edit it, select the Certificate for Secure Syslog check box, and click OK.
...
Table of Contents
Overview
We are providing you with the steps to integrate your Palo Alto Firewall- Syslog with Seceon SIEM so One can have Comprehensive visibility and Proactive Threat Detection in your Environment. There will be a log transfer between your firewall to APE(Analytics and Policy Engine) via CCE (Collection and Control Engine ). In this document, we are guiding you through the steps for Log forwarding.
To facilitate the integration with external log parsing systems, the firewall allows you to customize the log format; it also allows you to add custom Key: Value attribute pairs. Custom formats can be configured under
Device > Server Profiles > Syslog > Syslog Server Profile > Custom Log Format:
Step 2. Create a log forwarding profile
Go to Objects > Log forwarding. Click Add.
- Name: Enter a profile name (up to 31 characters). This name appears in the list of log forwarding profiles when defining security policies. The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.
- Syslog: Select the syslog server profile to specify additional destinations where the traffic log entries are sent.
- Click 'OK' to confirm your configuration.
Your Log Forwarding Profile is now created, as shown in the following example:
Step 3. Use the log forwarding profile in your security policy
Go to Policies > Security
Select the rule for which the log forwarding needs to be applied (Any Allow) in the following example:
Next, go to the Actions tab, select Log Forwarding Profile from the dropdown, and click OK when you are happy with your configuration:
After clicking OK, you will notice the forwarding icon in the 'Options' column of your security rule:
Step 4. Don't forget to commit your changes when you're finished.
Repeat the same steps for threat logs like we did for traffic here.
Reference Link:
Traffic Logs: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRxCAK
Threat Logs: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFfCAK
Verification of configuration
Verification of configuration can be done in two ways:
From the Collector-Syslog Server (CCE): This can involve logging into the CCE and checking the configuration settings, testing connectivity and functionality of the various components, and comparing the actual results against the expected or desired outcomes.
From the UI: This can involve logging into the user interface and checking the configuration settings, monitoring the logs and flows, and comparing the actual results against the expected or desired outcomes.
Both methods can be used to ensure that the system is properly configured and working as intended.
Using UI
STEP 1:Log in to UI >> SYSTEM
STEP 2: >> Logs and flows collection status
STEP 3: >>To verify the source device IP from the UI:
Log in to the user interface
Navigate to the "SYSTEM" section
Look for the "SOURCE DEVICE IP"
Check the IP address that is displayed
Compare the IP address displayed against the expected source device IP
This will allow you to ensure that the system is properly identifying the source device IP and that it matches the expected IP address..