panos
Key facts
- MSG Format based filter from NGFW, PANORAMA OR CORTEX data lake
- Legacy BSD Format default port 514 used by default. “Default TCP/UDP” is 30% slower than preferred IETF Framed
- IMPORTANT IETF Framed syslog must use port 601
Links
Sourcetypes
| sourcetype | notes | 
| pan:log | None | 
| pan:globalprotect | none | 
| pan:traffic | None | 
| pan:threat | None | 
| pan:system | None | 
| pan:config | None | 
| pan:hipmatch | None | 
| pan:correlation | None | 
| pan:userid | None | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| pan_panos_log | pan:log | netops | none | 
| pan_panos_globalprotect | pan:globalprotect | netfw | none | 
| pan_panos_traffic | pan:traffic | netfw | none | 
| pan_panos_threat | pan:threat | netproxy | none | 
| pan_panos_system | pan:system | netops | none | 
| pan_panos_config | pan:config | netops | none | 
| pan_panos_hipmatch | pan:hipmatch | netops | none | 
| pan_panos_correlation | pan:correlation | netops | none | 
| pan_panos_userid | pan:userid | netauth | none | 
Filter type
MSG Parse: This filter parses message content
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
- Refer to the admin manual for specific details of configuration
- Select TCP or SSL transport option
- Select IETF Format
- Ensure the format of the event is not customized
Options
| Variable | default | description | 
| SC4S_LISTEN_PULSE_PAN_PANOS_RFC6587_PORT | empty string | Enable a TCP using IETF Framing (RFC6587) port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_PAN_PANOS_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_DEST_PAN_PANOS_ARCHIVE | no | Enable archive to disk for this specific source | 
| SC4S_DEST_PAN_PANOS_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
An active firewall will generate frequent events. Use the following search to validate events are present per source device
index=<asconfigured> sourcetype=pan:*| stats count by host