panos
Key facts
- MSG Format based filter from NGFW, PANORAMA OR CORTEX data lake
- Legacy BSD Format default port 514 used by default. “Default TCP/UDP” is 30% slower than preferred IETF Framed
- IMPORTANT IETF Framed syslog must use port 601
Links
Sourcetypes
sourcetype |
notes |
pan:log |
None |
pan:pan_globalprotect |
none |
pan:traffic |
None |
pan:threat |
None |
pan:system |
None |
pan:config |
None |
pan:hipmatch |
None |
pan:correlation |
None |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
pan_panos_log |
pan:log |
netops |
none |
pan_panos_globalprotect |
pan:pan_globalprotect |
netfw |
none |
pan_panos_traffic |
pan:traffic |
netfw |
none |
pan_panos_threat |
pan:threat |
netproxy |
none |
pan_panos_system |
pan:system |
netops |
none |
pan_panos_config |
pan:config |
netops |
none |
pan_panos_hipmatch |
pan:hipmatch |
netops |
none |
pan_panos_correlation |
pan:correlation |
netops |
none |
Filter type
MSG Parse: This filter parses message content
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
- Refer to the admin manual for specific details of configuration
- Select TCP or SSL transport option
- Select IETF Format
- Ensure the format of the event is not customized
Options
Variable |
default |
description |
SC4S_LISTEN_PULSE_PAN_PANOS_RFC6587_PORT |
empty string |
Enable a TCP using IETF Framing (RFC6587) port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_PAN_PANOS_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_PAN_PANOS |
no |
Enable archive to disk for this specific source |
SC4S_DEST_PAN_PANOS_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
An active firewall will generate frequent events. Use the following search to validate events are present per source device
index=<asconfigured> sourcetype=pan:*| stats count by host