Configure Log Forwarding from Panorama to External Destinations
Panorama enables you to forward logs to external services, including syslog, email, SNMP trap, and HTTP-based services. Using an external service enables you to receive alerts for important events, archive monitored information on systems with dedicated long-term storage, and integrate with third-party security monitoring tools. In addition to forwarding firewall logs, you can forward the logs that the Panorama management server and Log Collectors generate. The Panorama management server or Log Collector that forwards the logs converts them to a format that is appropriate for the destination (syslog message, email notification, SNMP trap, or HTTP payload).
If your Panorama management server is a Panorama virtual appliance in Legacy mode, it converts and forwards logs to external services without using Log Collectors.
You can also forward logs directly from firewalls to external services: see Log Forwarding Options.
On a Panorama virtual appliance running Panorama 5.1 or earlier releases, you can use Secure Copy (SCP) commands from the CLI to export the entire log database to an SCP server and import it to another Panorama virtual appliance. A Panorama virtual appliance running Panorama 6.0 or later releases, and M-Series appliances running any release, do not support these options because the log database on those models is too large for an export or import to be practical.
To forward logs to external services, start by configuring the firewalls to forward logs to Panorama. Then you must configure the server profiles that define how Panorama and Log Collectors connect to the services. Lastly, you assign the server profiles to the log settings of Panorama and to Collector Groups.
- Configure the firewalls to forward logs to Panorama.
- Configure a server profile for each external service
that will receive log information.
- Select PanoramaServer Profiles and select the type of server that will receive the log data: SNMP Trap, Syslog, Email, or HTTP.
- Configure the server profile:
- Configure a Syslog server profile. If the syslog server requires client authentication, use the PanoramaCertificate ManagementCertificates page to create a certificate for securing syslog communication over SSL.
- Configure destinations for:
- Logs that the Panorama management server and Log Collectors generate.
- Firewall logs that a Panorama virtual appliance in Legacy mode collects.
- Select PanoramaLog Settings.
- Add one
or more match list profiles for each log type.The profiles specify log query filters, forwarding destinations, and automatic actions such as tagging. For each match list profile:
- Enter a Name to identify the profile.
- Select the Log Type.
- In the Filter drop-down, select Filter Builder. Specify the following and then Add each query:Connector logic (and/or)Log AttributeOperator to define inclusion or exclusion logicAttribute Value for the query to match
- Add the server profiles you configured for each external service.
- Click OK to save the profile.
- Configure destinations for firewall logs that Log Collectors
receive.Each Collector Group can forward logs to different destinations. If the Log Collectors are local to a high availability (HA) pair of Panorama management servers, you must log into each HA peer to configure log forwarding for its Collector Group.
- Select PanoramaCollector Groups and edit the Collector Group that receives the firewall logs.
- (Optional, SNMP trap forwarding only) Select Monitoring and configure the SNMP settings.
- Select Collector Log Forwarding and see step Add one or more match list profiles for each log type.
- Click OK to save your changes to the Collector Group.
- (Syslog forwarding only) If the syslog server
requires client authentication and the firewalls forward logs to
Dedicated Log Collectors, assign a certificate that secures syslog
communication over SSL.Perform the following steps for each Dedicated Log Collector:
- Select PanoramaManaged Collectors and edit the Log Collector.
- Select the Certificate for Secure Syslog and click OK.
- (SNMP trap forwarding only) Enable your SNMP
manager to interpret traps.Load the Supported MIBs and, if necessary, compile them. For the specific steps, refer to the documentation of your SNMP manager.
- Commit and verify your configuration changes.
- Select CommitCommit and Push to commit your changes to Panorama and push the changes to device groups, templates, and Collector Groups.
- Verify that the external services are receiving the
- Email server—Verify that the specified recipients are receiving logs as email notifications.
- Syslog server—Refer to the documentation for your syslog server to verify it’s receiving logs as syslog messages.
- SNMP manager—Refer to the documentation for your SNMP trap server to verify it’s receiving logs as SNMP traps.
- HTTP server—Verify that the HTTP-based server is receiving logs in the correct payload format.
Selective Log Forwarding Based on Log Attributes
Selective Log Forwarding Based on Log Attributes To maximize the efficiency of your incident response and monitoring operations, you can now create custom log forwarding ...
Configure Log Forwarding
Configure Log Forwarding In an environment where you use multiple firewalls to control and analyze network traffic, any single firewall can display logs and reports ...
Collector Group Configuration
Collector Group Configuration To configure a Collector Group , click Add and complete the following fields. Collector Group Settings Configured In Description Name Panorama Collector ...
Deploy Panorama M-Series Appliances with Local Log Collectors
Deploy Panorama M-Series Appliances with Local Log Collectors The following figures illustrate Panorama in a centralized log collection deployment. In these examples, the Panorama management ...
Log Forwarding Options
Log Forwarding Options By default, each firewall stores its log files locally. To use Panorama for centralized log monitoring and report generation, you must Configure ...
Manage Log Collection
Manage Log Collection All Palo Alto Networks firewalls can generate logs that provide an audit trail of firewall activities. For Centralized Logging and Reporting , ...
Panorama > Log Settings
Panorama > Log Settings Use the Log Settings page to forward the following log types to external services: System, Configuration, User-ID, and Correlation logs that ...
Monitor Panorama To monitor Panorama and its managed collectors, you can periodically view their System and Config logs ( filter logs by type), configure an ...
Select Log Forwarding Destinations
Select Log Forwarding Destinations Device > Log Settings Use these settings to configure log forwarding to Panorama, SNMP trap receivers, email servers, Syslog servers, and ...