Panorama

Panorama

Panorama is Palo Alto Networks' centralized security management solution that enables organizations to efficiently manage multiple Palo Alto Networks firewalls from a single interface. It provides visibility, control, automation, and reporting across distributed networks.

Panorama Configurations:

  • Log in to Panorama using the Web Interface.

  • Navigate to Device → Server Profiles → Syslog

  • Add a new profile.

  • Enter the profile name.

  • Under ‘Servers', click on the add button and define the following:

    • Name: name for the Syslog server.

    • Syslog Server: IP address or hostname of the Syslog server.

    • Port—The port number on which to send syslog messages (default is UDP on port 514); you must use the same port number on the firewall and the syslog server.

    • Transport: Choose UDP, TCP, or SSL/TLS based on your listener type.

    • Format—Select the syslog message format to use: BSD (the default) or IETF. Traditionally, BSD format is over UDP and IETF format is over TCP or SSL/TLS.

    • Facility—Select a syslog standard value (default is LOG_USER) to calculate the priority (PRI) field in your syslog server implementation. Select the value that maps to how you use the PRI field to manage your syslog messages.

  • Click OK to save the profile.

XPLG Configurations:


When adding/editing the logs to XpoLog it is mandatory to apply the correct log type(s) to each of the logs:

  1. syslog - all logs that the application will analyze must have syslog as a log type

  2. traffic - all the logs must also be configured to have traffic as a log type

  3. panorama - all the logs must also be configured to have panorama as a log type

Once the required information is set, you should edit the log pattern. This step is crucial to the accuracy and deployment of the Panorama App. Use the following pattern for the panorama traffic log:

XPLG:[{timestamp:Timestamp,MM/dd/yyyy HH:mm:ss.SSS}] [{text:Facility,ftype=facility}] [{priority:Level,ftype=level,DEBUG;INFO;WARN;ERROR;FATAL}] [{text:Source Device,ftype=source-device}] {block,start,emptiness=true}{text:Application Name,ftype=app-name}[{text:Process Id,ftype=pid}]: {block,end,emptiness=true}{text:Date,charsLength=15;,} {text:Device,ftype=device} {text:Log Type,ftype=logtype},{date:Receive Time,yyyy/MM/dd HH:mm:ss},{text:Serial#,ftype=serial},{text:Type,ftype=eventSource},{text:Session Action,ftype=action},{text:Config Version,ftype=configversion},{date:Session Start Time,yyyy/MM/dd HH:mm:ss},{ip:SourceIP,ftype=sourceip},{ip:Destination IP,ftype=targetip},{ip:Nat SourceIP,ftype=natsourceip},{ip:Nat Destination IP,ftype=nattargetip},{text:Security Policy Name,ftype=rulename},{text:Source User,ftype=username},{text:Destination User,ftype=dstusername},{text:Application,ftype=application},{text:Virtual System,ftype=virtualsystem},{text:Source Zone,ftype=srczone},{text:Destination Zone,ftype=dstzone},{text:Ingress Interface,ftype=srcintf},{text:Egress Interface,ftype=dstintf},{text:Log Forwarding Profile,ftype=logaction},{date:First Packet Time,yyyy/MM/dd HH:mm:ss},{text:Elapsed Time (ms),ftype=elapsedtime},{text:Total Packets,ftype=packets},{number:Source Port,ftype=sourceport},{number:Destination Port,ftype=dstport},{number:Nat Source Port,ftype=natsourceport},{number:Nat Destination Port,ftype=natdstport},{text:Flags,ftype=flags},{text:IP Protocol,ftype=ipprotocol},{text:Action Taken,ftype=eventName},{number:Bytes,ftype=bytes},{text:Bytes Sent,ftype=bytesent},{text:Bytes Received,ftype=bytesreceived},{number:Packets Sent,ftype=packets},{text:First Packet Recieved Timestamp,ftype=start},{number:Packets Retransmitted,ftype=packetsretransmitted},{text:Security Rule Action,ftype=secruleaction},{text:Unknown1},{text:Sequence Number,ftype=sequencenumber},{text:Session ID,ftype=sessionid},{text:Source Country,ftype=srccountry},{text:Destination Country,ftype=dstcountry},{text:Unknown2},{text:Packets Transmitted,ftype=sentpackets},{text:Packets Recieved,ftype=packetsrecieved},{text:Session End Reason,ftype=sessionendreason},{text:Sent Packets,ftype=sentpackets},{text:Recieved Packets,ftype=recievedpackets},{text:Forwarded Bytes,ftype=forwardedbytes},{text:Reverse Bytes,ftype=reversebytes},{text:Unknown3},{text:Security Rule Name,ftype=secrulenname},{text:Source Nat Type,ftype=sourcenattype},{text:Unknown4},{text:Unknown5},{text:Unknown6},{text:Unknown7},{text:Unknown8},{text:Unknown9},{text:Unknown10},{text:Unknown11},{text:Threat ID,ftype=threatid},{text:Repeat Count,ftype=repeatcount},{text:Unknown12},{text:Unique Threat ID,ftype=uuid},{text:Unknown13},{text:Unknown14},{text:Unknown15},{text:Unknown16},{text:Unknown17},{text:Unknown18},{text:Unknown20},{text:Unknown21},{text:Unknown22},{text:Unknown23},{text:Unknown24},{text:Unknown25},{text:Unknown26},{text:Unknown27},{text:Unknown28},{text:Unknown29},{text:Unknown30},{text:Unknown31},{text:Unknown32},{text:Unknown33},{text:Unknown34},{text:Unknown35},{text:Unknown36},{text:Unknown37},{text:Unknown38},{text:Unknown39},{text:Unknown40},{text:Unknown41},{text:Unknown42},{text:Unknown43},{text:Unknown44},{text:Unknown45},{text:Unknown46},{text:Unknown47},{text:Unknown48},{text:Unknown49},{text:ISO Timestamp},{text:Unkown50},{text:Unknown51},{text:Infrastructre Type,ftype=infratype},{text:Industry Category,ftype=industrycat},{text:Threat/Category Type,ftype=threattype},{text:Threat Severity Level,ftype=threatlevel},{block,start,emptiness=true}"{block,end,emptiness=true}{text:Threat Indicators}{block,start,emptiness=true}"{block,end,emptiness=true},{text:Threat Name,ftype=threat},{text:Threat Type,ftype=threattype},{text:URL Filtering Log},{text:File Blocking Log},{text:Wildfire Analysis Score}

 

For more information about the panorama log fields, see below the format Conversion Table:

 

Field Name

Field Key

Description

 

Date

receive_time

Time when the log was received

Device

device_name

Firewall that generated the log

Log Type

log_type

Type of log entry

Recieve Time

generated_time

Time when the event occurred

Serial#

serial_number

Firewall's unique serial number

Type

log_subtype

Subtype of the log

Session Action

session_end_reason

How the session ended

Config Version

config_version

Version of the configuration

Session Start Time

start_time

Session start time

SourceIP

src_ip

Source IP of the session

DestinationIP

dst_ip

Destination IP of the session

Nat SourceIP

natsrc_ip

Translated source IP if NAT applied

Nat DestinationIP

natdst_ip

Translated destination IP if NAT applied

Security Policy Name

rule_name

Name of the matched security policy

Source User

src_user

Username associated with source IP

Destination User

dst_user

Username associated with destination IP

Application

app

Application detected in the session

Virtual System

vsys

Virtual system name

Source Zone

src_zone

Security zone of source IP

Destination Zone

dst_zone

Security zone of destination IP

Ingress Interface

ingress_if

Physical/logical interface where session entered

Egress Interface

egress_if

Physical/logical interface where session exited

Log Forwarding Profile

log_forwarding

Log forwarding profile applied

First Packet Time

pkt_capture_time

Timestamp of first packet in session

Elapsed Time(ms)

elapsed_time

Total duration of session in ms

Total Packets

total_pkt

Total number of packets in session

Source Port

src_port

Source port of session

Destination Port

dst_port

Destination port of session

Nat Source Port

natsrc_port

Translated source port if NAT applied

Nat Destingation Port

natdst_port

Translated destination port if NAT applied

Flags

flags

Session characteristics (bitwise)

IP Protocol

protocol

Transport protocol used

Action Taken

action

Action applied (allow/deny)

Bytes

bytes

Total Bytes

 

Bytes Sent

bytes_sent

Total Sent Bytes

 

Bytes Recieved

bytes_recieved

Total Recieved Bytes

 

Packets Sent

total_packets_sent

Total packets sent in session

 

First Packet Recieved Timestamp

pkt_capture_time

Timestamp of first packet in session

 

Packets Retreansmitted

total_packets_transmitted

Total packets transmitted in session

Security Rule Action

rule_action

Action of security rule

Sequence Number

session_id_64bit

Extended unique session identifier

SessionID

session_id

Unique session identifier

Source Country

src_addr_group

Source IP address group

Destination Country

dst_addr_group

Destination IP address group

Packets Transmitted

packets_tx

Total number of packets transmitted

Packets Recieved

packets_rx

Total number of packets received

Session End Reason

session_end_reason

Session ending reason

 

Sent Packets

total_packets_sent

Total packets sent in session

Recieved Packets

total_packets_received

Total packets received in session

Forwarded Bytes

total_bytes_forwarded

Total bytes forwarded

Reverse Bytes

total_bytes_reversed

Total bytes received

Security Rule Name

security_rule_name

Security policy name applied

Source Nat Type

src_nat_type

Type of NAT applied to source

Threat ID

threat_id

Threat ID detected

Repeat Count

repeat_count

Number of times the same threat was observed

Unique Threat ID

threat_uuid

Unique identifier for detected threats

ISO Timestamp

gen_time

Timestamp when threat log was generated

Infrastructure Type

infra_type

Infrastructure type detected

Industry Caegory

industry_category

Industry category of the traffic

Threat/Category Type

threat_category

Category of detected threat

Threat Severity Level

severity

Severity of detected threat

Threat Indicators

threat_indicators

Indicators of compromise detected

Threat Name

threat_name

Detected threat name

Threat Type

threat_type

Type of detected threat

URL Filtering Log

url_filtering

Was URL filtering applied

File Blocking Log

file_blocking

Was file blocking triggered

Wildfire Analysis Score

wildfire_score

Wildfire threat analysis score