Create a Remote Log Source - Palo Alto Firewall
Â
Topics Discussed
Â
You can use this document to add a remote log collector to a Palo Alto Firewall remote device (log source).
Pre-deployment considerations
Before you begin, review the following requirements:
Log Relay
For remote log collection, you must have a Log Relay server on your account.
To learn how to add Log Relay to your account, see Obtain Log Relay for Remote Log Collection.
Assumptions
The firewall is running PAN-OS version 8.1.x
The device is already set up and configured with the security policies that are needed
You are allowing traffic through TCP port 10206
Forwarding traffic logs from a Palo Alto Networks firewall to a syslog server has four main steps:
Create a syslog server profile
Create a log forwarding profile
Use the log forwarding profile in your security policy
Commit the changes
The documentation below outlines steps 1-3.
Create a Syslog Server Profile
Log into the Palo Alto console.
Select Device, then select Server Profiles, followed by Syslog.
In the bottom left-side of the screen, click Add to create a new server profile.
In the Syslog Server Profile window, in the Name field, enter Log Relay Syslog Server Profile.
Click Servers, then click Add to create a new server.
Name the server Log Relay Input.
In Syslog Server, input the IP address of the log relay.
Set the Transport to TCP.
Set the Port to 10206.
Set the Format to BSD.
Set the Facility to LOG_USER.
On the Custom Log Format tab, change the Custom Format of each log type to the text provided in the table below.
Click OK.
Select Device, then select Log Settings.
For each of the log types displayed (System, Configuration, User-ID, and HIP Match), click Add to add a new field to the table.
In Name, input a name that corresponds to the log type.
Set the Filter to All Logs.
In the Syslog window, click Add, then select the Log Relay Syslog Server Profile that you created in step 4.
Click OK.
Repeat steps 6-10 for each of the log types.
Create a Log Forwarding Profile
Select Objects, then select Log Forwarding.
In the bottom left-side of the screen, click Add to create a new Log Forwarding object.
In Name, enter Log Relay Forwarder.
Enter a description, indicating that this is the object that will be used to forward logs to the log relay.
Click Add to add a new log relay policy.
In Name, enter Log Relay Auth.
Enter a description, indicating that this is the log forwarding match list that will be used for auth logs.
In Type, select auth.
Set the Filter to All Logs.
On the Syslog screen, click Add, then select the Log Relay Syslog Server Profile that you created in step 4.
Click OK.
Repeat steps 19-20 for each of the log types that are listed.
Change the titles and descriptions to match the corresponding log type.
Select Network, then select Zones.
Â
Modify each zone that is configured on the device:
In the Log Setting drop down menu, select Log Relay Forwarder.
Use the log forwarding profile in your security policy
Go to Policies > Security
Select the rule for which the log forwarding needs to be applied (Any Allow) in the following example:
Next, go to the Actions tab, select Log Forwarding Profile from the dropdown, and click OK when you are happy with your configuration:
After clicking OK, you will notice the forwarding icon in the 'Options' column of your security rule: