<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configure Panorama as standalone syslog server in Panorama Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/panorama-discussions/configure-panorama-as-standalone-syslog-server/m-p/562152#M1942</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/269566"&gt;@Beaverdad73&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firewall needs to be registered in Panorama to be able to send logs to Panorama. You do not have to use Device Group / Template Stack configurations to manage Firewall from Panorama, but Firewall's serial number needs to be at least registered and assigned to log collector group to get logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you mean scenario to configure a Firewall with syslog profile pointing to Panorama's IP address and use Panorama as a syslog server, I do not think this is going to be working. Panorama does not ingest 3rd party logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
    <pubDate>Tue, 17 Oct 2023 21:04:40 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2023-10-17T21:04:40Z</dc:date>
    <item>
      <title>Configure Panorama as standalone syslog server</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/configure-panorama-as-standalone-syslog-server/m-p/562079#M1940</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider cec ced bte cee cef ceg ceh cei cej cek cel cem cen ceo cep ceq cer ces cet ceu cev cew cex cey cez cfa cfb cfc cfd cfe cff cfg cfh cfi cfj"&gt;my customer would like use a Panorama device as standalone syslog server (using standard syslog tcp/udp port 514), so that it can collect logs for firewalls it does not manage.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider cec ced bte cee cef ceg ceh cei cej cek cel cem cen ceo cep ceq cer ces cet ceu cev cew cex cey cez cfa cfb cfc cfd cfe cff cfg cfh cfi cfj"&gt;Is it possible?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider cec ced bte cee cef ceg ceh cei cej cek cel cem cen ceo cep ceq cer ces cet ceu cev cew cex cey cez cfa cfb cfc cfd cfe cff cfg cfh cfi cfj"&gt;So we can configure on the Panorama that manage the firewalls, a syslog server profile pointing the ip address of the standalone syslog server Panorama (that doesn't manage the FWs). Which port we need to use and which syslog format (BSD or IETF)?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider cec ced bte cee cef ceg ceh cei cej cek cel cem cen ceo cep ceq cer ces cet ceu cev cew cex cey cez cfa cfb cfc cfd cfe cff cfg cfh cfi cfj"&gt;Thanks&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider cec ced bte cee cef ceg ceh cei cej cek cel cem cen ceo cep ceq cer ces cet ceu cev cew cex cey cez cfa cfb cfc cfd cfe cff cfg cfh cfi cfj"&gt;Max&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 13:44:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/configure-panorama-as-standalone-syslog-server/m-p/562079#M1940</guid>
      <dc:creator>Beaverdad73</dc:creator>
      <dc:date>2023-10-17T13:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Panorama as standalone syslog server</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/configure-panorama-as-standalone-syslog-server/m-p/562152#M1942</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/269566"&gt;@Beaverdad73&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firewall needs to be registered in Panorama to be able to send logs to Panorama. You do not have to use Device Group / Template Stack configurations to manage Firewall from Panorama, but Firewall's serial number needs to be at least registered and assigned to log collector group to get logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you mean scenario to configure a Firewall with syslog profile pointing to Panorama's IP address and use Panorama as a syslog server, I do not think this is going to be working. Panorama does not ingest 3rd party logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 21:04:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/configure-panorama-as-standalone-syslog-server/m-p/562152#M1942</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2023-10-17T21:04:40Z</dc:date>
    </item>
  </channel>
</rss>

