Enhanced Application Logs for ICMPv6
Focus
Focus
What's New in the NetSec Platform

Enhanced Application Logs for ICMPv6

Table of Contents

Enhanced Application Logs for ICMPv6

Automatically generate enhanced application logs from ICMPv6 neighbor discovery protocol packets to support IPv6 deployments in Device Security and Cortex XDR.
Device Security uses ARP Enhanced Application Logs (EAL) to provide visibility and identification for devices on IPv4 networks. However, IPv6 deployments use Neighbor Discovery Protocol (NDP) instead of ARP, which means a lack of EAL visibility prevents full IPv6 support for Device Security.
PAN-OS® now uses Deep Packet Inspection (DPI) to generate EALs from ICMPv6 NDP packets, providing the same level of functionality for IPv6 environments. With ICMPv6 EALs, Device Security can use this data to support Device-ID in IPv6 deployments. This change ensures that Device Security has the necessary visibility to identify and classify devices communicating over IPv6.
EALs for ICMPv6 NDP are enabled by default and are generated for both Network Solicitation (NS) and Network Advertisement (NA) packets. These logs are transmitted over the acknowledgment (ACK) channel for reliable delivery to prevent loss due to congestion. If you experience log flooding in high-volume IPv6 deployments, you can disable ICMPv6 EAL logging using the following CLI command:
set deviceconfig setting logging enhanced-application-logging disable-global icmpv6-ndp
To complete the configuration and apply the change, commit the device configuration. To re-enable the feature, use the following command:
delete deviceconfig setting logging enhanced-application-logging disable-global icmpv6-ndp