Traffic Log Fields

Format:
FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE, Generated Time, Source IP, Destination IP, NAT Source IP, NAT Destination IP, Rule Name, Source User, Destination User, Application, Virtual System, Source Zone, Destination Zone, Inbound Interface, Outbound Interface, Log Action, FUTURE_USE, Session ID, Repeat Count, Source Port, Destination Port, NAT Source Port, NAT Destination Port, Flags, Protocol, Action, Bytes, Bytes Sent, Bytes Received, Packets, Start Time, Elapsed Time, Category, FUTURE_USE, Sequence Number, Action Flags, Source Location, Destination Location, FUTURE_USE, Packets Sent, Packets Received, Session End Reason, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, Action Source, Source VM UUID, Destination VM UUID, Tunnel ID/IMSI, Monitor Tag/IMEI, Parent Session ID, Parent Start Time, Tunnel Type
Field Name
Description
Receive Time (receive_time or cef-formatted-receive_time)
Time the log was received at the management plane.
Serial Number (serial)
Serial number of the firewall that generated the log.
Type (type)
Specifies type of log; values are traffic, threat, config, system and hip-match.
Threat/Content Type (subtype)
Subtype of traffic log; values are start, end, drop, and deny
  • Start—session started
  • End—session ended
  • Drop—session dropped before the application is identified and there is no rule that allows the session.
  • Deny—session dropped after the application is identified and there is a rule to block or no rule that allows the session.
Generated Time (time_generated or cef-formatted-time_generated)
Time the log was generated on the dataplane.
Source Address (src)
Original session source IP address.
Destination Address (dst)
Original session destination IP address.
NAT Source IP (natsrc)
If Source NAT performed, the post-NAT Source IP address.
NAT Destination IP (natdst)
If Destination NAT performed, the post-NAT Destination IP address.
Rule Name (rule)
Name of the rule that the session matched.
Source User (srcuser)
Username of the user who initiated the session.
Destination User (dstuser)
Username of the user to which the session was destined.
Application (app)
Application associated with the session.
Virtual System (vsys)
Virtual System associated with the session.
Source Zone (from)
Zone the session was sourced from.
Destination Zone (to)
Zone the session was destined to.
Inbound Interface (inbound_if)
Interface that the session was sourced from.
Outbound Interface (outbound_if)
Interface that the session was destined to.
Log Action (logset)
Log Forwarding Profile that was applied to the session.
Session ID (sessionid)
An internal numerical identifier applied to each session.
Repeat Count (repeatcnt)
Number of sessions with same Source IP, Destination IP, Application, and Subtype seen within 5 seconds; used for ICMP only.
Source Port (sport)
Source port utilized by the session.
Destination Port (dport)
Destination port utilized by the session.
NAT Source Port (natsport)
Post-NAT source port.
NAT Destination Port (natdport)
Post-NAT destination port.
Flags (flags)
32-bit field that provides details on session; this field can be decoded by AND-ing the values with the logged value:
  • 0x80000000 —session has a packet capture (PCAP)
  • 0x02000000 —IPv6 session
  • 0x01000000 —SSL session was decrypted (SSL Proxy)
  • 0x00800000 —session was denied via URL filtering
  • 0x00400000 —session has a NAT translation performed (NAT)
  • 0x00200000 —user information for the session was captured through Captive Portal
  • 0x00080000 —X-Forwarded-For value from a proxy is in the source user field
  • 0x00040000 —log corresponds to a transaction within a http proxy session (Proxy Transaction)
  • 0x00008000 —session is a container page access (Container Page)
  • 0x00002000 —session has a temporary match on a rule for implicit application dependency handling. Available in PAN-OS 5.0.0 and above.
  • 0x00000800 —symmetric return was used to forward traffic for this session
IP Protocol (proto)
IP protocol associated with the session.
Action (action)
Action taken for the session; possible values are:
  • allow—session was allowed by policy
  • deny—session was denied by policy
  • drop—session was dropped silently
  • drop ICMP—session was silently dropped with an ICMP unreachable message to the host or application
  • reset both—session was terminated and a TCP reset is sent to both the sides of the connection
  • reset client—session was terminated and a TCP reset is sent to the client
  • reset server—session was terminated and a TCP reset is sent to the server
Bytes (bytes)
Number of total bytes (transmit and receive) for the session.
Bytes Sent (bytes_sent)
Number of bytes in the client-to-server direction of the session.
Available on all models except the PA-4000 Series.
Bytes Received (bytes_received)
Number of bytes in the server-to-client direction of the session.
Available on all models except the PA-4000 Series.
Packets (packets)
Number of total packets (transmit and receive) for the session.
Start Time (start)
Time of session start.
Elapsed Time (sec)
Elapsed time of the session.
Category (category)
URL category associated with the session (if applicable).
Sequence Number (seqno)
A 64-bit log entry identifier incremented sequentially; each log type has a unique number space.
Action Flags (actionflags)
A bit field indicating if the log was forwarded to Panorama.
Source Country (srcloc)
Source country or Internal region for private addresses; maximum length is 32 bytes.
Destination Country (dstloc)
Destination country or Internal region for private addresses. Maximum length is 32 bytes.
Packets Sent (pkts_sent)
Number of client-to-server packets for the session.
Available on all models except the PA-4000 Series.
Packets Received (pkts_received)
Number of server-to-client packets for the session.
Available on all models except the PA-4000 Series.
Session End Reason (session_end_reason)
The reason a session terminated. If the termination had multiple causes, this field displays only the highest priority reason. The possible session end reason values are as follows, in order of priority (where the first is highest):
  • threat—The firewall detected a threat associated with a reset, drop, or block (IP address) action.
  • policy-deny—The session matched a security rule with a deny or drop action.
  • decrypt-cert-validation—The session terminated because you configured the firewall to block SSL forward proxy decryption or SSL inbound inspection when the session uses client authentication or when the session uses a server certificate with any of the following conditions: expired, untrusted issuer, unknown status, or status verification time-out. This session end reason also displays when the server certificate produces a fatal error alert of type bad_certificate, unsupported_certificate, certificate_revoked, access_denied, or no_certificate_RESERVED (
    SSLv3 only
    ).
  • decrypt-unsupport-param—The session terminated because you configured the firewall to block SSL forward proxy decryption or SSL inbound inspection when the session uses an unsupported protocol version, cipher, or SSH algorithm. This session end reason is displays when the session produces a fatal error alert of type unsupported_extension, unexpected_message, or handshake_failure.
  • decrypt-error—The session terminated because you configured the firewall to block SSL forward proxy decryption or SSL inbound inspection when firewall resources or the hardware security module (HSM) were unavailable. This session end reason is also displayed when you configured the firewall to block SSL traffic that has SSH errors or that produced any fatal error alert other than those listed for the decrypt-cert-validation and decrypt-unsupport-param end reasons.
  • tcp-rst-from-client—The client sent a TCP reset to the server.
  • tcp-rst-from-server—The server sent a TCP reset to the client.
  • resources-unavailable—The session dropped because of a system resource limitation. For example, the session could have exceeded the number of out-of-order packets allowed per flow or the global out-of-order packet queue.
  • tcp-fin—One host or both hosts in the connection sent a TCP FIN message to close the session.
  • tcp-reuse—A session is reused and the firewall closes the previous session.
  • decoder—The decoder detects a new connection within the protocol (such as HTTP-Proxy) and ends the previous connection.
  • aged-out—The session aged out.
  • unknown—This value applies in the following situations:
    • Session terminations that the preceding reasons do not cover (for example, a
      clear session all
      command).
    • For logs generated in a PAN-OS release that does not support the session end reason field (releases older than PAN-OS 6.1), the value will be
      unknown
      after an upgrade to the current PAN-OS release or after the logs are loaded onto the firewall.
    • In Panorama, logs received from firewalls for which the PAN-OS version does not support session end reasons will have a value of
      unknown
      .
  • n/a—This value applies when the traffic log type is not
    end
    .
Device Group Hierarchy (dg_hier_level_1 to dg_hier_level_4)
A sequence of identification numbers that indicate the device group’s location within a device group hierarchy. The firewall (or virtual system) generating the log includes the identification number of each ancestor in its device group hierarchy. The shared device group (level 0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated by a firewall (or virtual system) that belongs to device group 45, and its ancestors are 34, and 12. To view the device group names that correspond to the value 12, 34 or 45, use one of the following methods:
CLI command in configure mode:
show readonly dg-meta-data
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dg-hierarchy></show>
Virtual System Name (vsys_name)
The name of the virtual system associated with the session; only valid on firewalls enabled for multiple virtual systems.
Device Name (device_name)
The hostname of the firewall on which the session was logged.
Action Source (action_source)
Specifies whether the action taken to allow or block an application was defined in the application or in policy. The actions can be allow, deny, drop, reset- server, reset-client or reset-both for the session.
Source VM UUID (src_uuid)
Identifies the source universal unique identifier for a guest virtual machine in the VMware NSX environment.
Destination VM UUID (dst_uuid)
Identifies the destination universal unique identifier for a guest virtual machine in the VMware NSX environment.
Tunnel ID/IMSI (tunnelid/imsi)
International Mobile Subscriber Identity (IMSI) is a unique number allocated to each mobile subscriber in the GSM/UMTS/EPS system. IMSI shall consist of decimal digits (0 through 9) only and maximum number of digits allowed are 15.
Monitor Tag/IMEI (monitortag/imei)
International Mobile Equipment Identity (IMEI) is a unique 15 or 16 digit number allocated to each mobile station equipment.
Parent Session ID (parent_session_id)
ID of the session in which this session is tunneled. Applies to inner tunnel (if two levels of tunneling) or inside content (if one level of tunneling) only.
Parent Start Time (parent_start_time)
Year/month/day hours:minutes:seconds that the parent tunnel session began.
Tunnel Type (tunnel)
Type of tunnel, such as GRE or IPSec.

Related Documentation