<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Log Forwarding in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/log-forwarding/m-p/503794#M105460</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/198708"&gt;@CraigAddison&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for Traffic, Threat, URL, Data Filtering, WildFire,...logs you have to enable Log Forwarding profile under each security policy. This type of log gets generated depending on log type when for example security policy is getting hit, threat signature is getting hit, there is a URL category match. As long as you have: "Log at Session End" enabled and a Log Forwarding profile in place with Panorama set as destination, logs will be sent to Panorama's log collector. Here is corresponding KB:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/kcSArticleDetail?id=kA10g000000ClGL" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/kcSArticleDetail?id=kA10g000000ClGL&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For System, Configuration, User-ID... logs, you can configure it from Device &amp;gt; Log Settings. This log will get forwarded to Panorama's log collector as it gets generated on Firewall. Since this log type is not traffic dependent even passive Firewall will generated some system logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you do not see logs in Panorama, I would recommend to go through this KB:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/kCSArticleDetail?id=kA10g000000ClXA" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/kCSArticleDetail?id=kA10g000000ClXA&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would check below points:&lt;/P&gt;&lt;P&gt;- Make sure that Firewall is assigned to log collector and this change has been committed and pushed to log collector.&lt;/P&gt;&lt;P&gt;- Make sure that on Firewall side from CLI: "show log-collector preference-list" you will see log collectors IP addresses. I had a case before that this was not applied until I restarted management process.&lt;/P&gt;&lt;P&gt;- Make sure you will see the log received in Panorama from CLI:&amp;nbsp;show logging-status device &amp;lt;serial number&amp;gt;.&lt;/P&gt;&lt;P&gt;- Make sure that Firewall and Panorama are using the same time/time zone.&lt;/P&gt;&lt;P&gt;- Make sure there are no restrictions/blocked ports between Firewall and log collector.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jun 2022 13:00:01 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2022-06-15T13:00:01Z</dc:date>
    <item>
      <title>Log Forwarding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/log-forwarding/m-p/503767#M105458</link>
      <description>&lt;P&gt;I have setup Syslog forwarding from multiple firewalls to a log collector, but I cannot see any Syslog traffic in the logs. Does this traffic get logged by the firewall/Panorama, or is it allowed through without needing a firewall policy?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 11:23:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/log-forwarding/m-p/503767#M105458</guid>
      <dc:creator>CraigAddison</dc:creator>
      <dc:date>2022-06-15T11:23:38Z</dc:date>
    </item>
    <item>
      <title>Re: Log Forwarding</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/log-forwarding/m-p/503794#M105460</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/198708"&gt;@CraigAddison&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for Traffic, Threat, URL, Data Filtering, WildFire,...logs you have to enable Log Forwarding profile under each security policy. This type of log gets generated depending on log type when for example security policy is getting hit, threat signature is getting hit, there is a URL category match. As long as you have: "Log at Session End" enabled and a Log Forwarding profile in place with Panorama set as destination, logs will be sent to Panorama's log collector. Here is corresponding KB:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/kcSArticleDetail?id=kA10g000000ClGL" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/kcSArticleDetail?id=kA10g000000ClGL&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For System, Configuration, User-ID... logs, you can configure it from Device &amp;gt; Log Settings. This log will get forwarded to Panorama's log collector as it gets generated on Firewall. Since this log type is not traffic dependent even passive Firewall will generated some system logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you do not see logs in Panorama, I would recommend to go through this KB:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/kCSArticleDetail?id=kA10g000000ClXA" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/kCSArticleDetail?id=kA10g000000ClXA&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would check below points:&lt;/P&gt;&lt;P&gt;- Make sure that Firewall is assigned to log collector and this change has been committed and pushed to log collector.&lt;/P&gt;&lt;P&gt;- Make sure that on Firewall side from CLI: "show log-collector preference-list" you will see log collectors IP addresses. I had a case before that this was not applied until I restarted management process.&lt;/P&gt;&lt;P&gt;- Make sure you will see the log received in Panorama from CLI:&amp;nbsp;show logging-status device &amp;lt;serial number&amp;gt;.&lt;/P&gt;&lt;P&gt;- Make sure that Firewall and Panorama are using the same time/time zone.&lt;/P&gt;&lt;P&gt;- Make sure there are no restrictions/blocked ports between Firewall and log collector.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 13:00:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/log-forwarding/m-p/503794#M105460</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-06-15T13:00:01Z</dc:date>
    </item>
  </channel>
</rss>

