<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Report-based Logging Without Interfering With Policies in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/report-based-logging-without-interfering-with-policies/m-p/71839#M40949</link>
    <description>&lt;P&gt;Take one of the ports on your firewall and turn it into a TAP port, and place it in a zone called TAP. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;Now, have your L2/L3 switch mirror one (or more) firewall interfaces and feed that back into the TAP port on the firewall. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;When you want to log all instances of "ping", you can create a policy on your firewall that says "permit from TAP to TAP app=ping with logging enabled".&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;This comes at the cost of additional firewall CPU utilization, as the firewall will be forced to process the traffic twice. &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 29 Jan 2016 14:38:44 GMT</pubDate>
    <dc:creator>jvalentine</dc:creator>
    <dc:date>2016-01-29T14:38:44Z</dc:date>
    <item>
      <title>Report-based Logging Without Interfering With Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/report-based-logging-without-interfering-with-policies/m-p/71718#M40902</link>
      <description>&lt;P&gt;Hi PANland, I'm back with another implementation question th&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So PAN devices log when you tell them to, but for their reports feature it seems that with or without logs they will keep unmutable counters of very basic information that has to be parsed anyway to make it through the firewall (ie. application, source, etc.). Here’s my situation: I’m noticing a (possibly) high number of pings in the daily top applications report. However, when I click to see app scope information about pings for that day, the scope comes up blank in all categories.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My assumption is, that’s because no pings have been logged in that day (checking the traffic/threat logs), therefore there’s nothing for the system to grab besides counters that are inherently unrelated to one another. Is there any method available such that I can perhaps place a “lens” or policy of some sort to tell the device to log all instances of some basic rule. In this case it would be “application: ping”. I’m attempting to figure out a way to do it from policies alone without changing how our firewall already handles pings and without logging anything extra in the process. Now I'm not a dev nor do I have any clue how this puppy works outside of what the docs and CLI logs tell me, but I feel there's gotta be a simpler way.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Feel free to correct me in my PANjutsu path if I’m forgetting a feature that handles this specifically.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jan 2016 19:16:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/report-based-logging-without-interfering-with-policies/m-p/71718#M40902</guid>
      <dc:creator>joshuahiggins</dc:creator>
      <dc:date>2016-01-27T19:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: Report-based Logging Without Interfering With Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/report-based-logging-without-interfering-with-policies/m-p/71759#M40918</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in the unfiltered ACC dashboard, you will actually get to see 'hardware' counters directly off the dataplane, once you drill down into a filtered view, you will access the log database and will only be presented with data that has been logged&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here's a little article about this phenomenon:&amp;nbsp;&lt;A title="ACC Shows Different Results After Clearing Filters" href="https://live.paloaltonetworks.com/t5/Management-Articles/ACC-Shows-Different-Results-After-Clearing-Filters/ta-p/53006" target="_blank"&gt;ACC Shows Different Results After Clearing Filters&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you want to have more custom tailored reports, please take a look at&amp;nbsp;&lt;A title="Getting Started: Custom reports " href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Custom-reports/ta-p/69951" target="_blank"&gt;Getting Started: Custom reports&lt;/A&gt;&amp;nbsp;on how to create your own custom reports that only give you the data you want to look at &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 09:27:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/report-based-logging-without-interfering-with-policies/m-p/71759#M40918</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-01-28T09:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: Report-based Logging Without Interfering With Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/report-based-logging-without-interfering-with-policies/m-p/71800#M40938</link>
      <description>&lt;P&gt;Right, that's in accordance with what I suspected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question and goal lies in this sentence exactly:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt; wrote:&lt;BR /&gt;&lt;BR /&gt;
&lt;P&gt;in the unfiltered ACC dashboard, you will actually get to see 'hardware' counters directly off the dataplane, once you drill down into a filtered view, you will access the log database and will only be presented with data that has been logged&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;This is the issue I'm trying to address, it's not that I want to clear out the counters, it's that I want to start logging &lt;EM&gt;because&lt;/EM&gt; of the counters. I understand that you can just flip logging on to a bunch of policies, but ping is not exactly something handled exclusively by policies. Often the policy handles other apps as well. I don't want to log the other apps because that'll lead to quite an increase in average logging.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;That's why I want to know if there's any plans for alternate methods for logging. Such as logging policies that don't affect blocking/allowing/alerting/dropping.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm also still all ears for anyone who can come up with something simpler than trying to come up with a "wrapping policy" that, for over 300 policies, will not be just a side project. Just to log all instances of ping for a period of time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because once the instances are logged, THEN I can see the reports that I need.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 21:09:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/report-based-logging-without-interfering-with-policies/m-p/71800#M40938</guid>
      <dc:creator>joshuahiggins</dc:creator>
      <dc:date>2016-01-28T21:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: Report-based Logging Without Interfering With Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/report-based-logging-without-interfering-with-policies/m-p/71826#M40944</link>
      <description>&lt;P&gt;that's tricky &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;besides actually having a security log that applies an action to a set of applications, you can't set a differentiator for logging (in a single security policy log ping nolog other stuff)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the only way around could be to set up a netflow server and create these logs externally, or create separate security policies for the applications you do want to log and the ones you don't want to log.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can reach out to your Sales contact so they can create a feature request or have your vote added if this has already been requested.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2016 08:59:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/report-based-logging-without-interfering-with-policies/m-p/71826#M40944</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-01-29T08:59:25Z</dc:date>
    </item>
    <item>
      <title>Re: Report-based Logging Without Interfering With Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/report-based-logging-without-interfering-with-policies/m-p/71839#M40949</link>
      <description>&lt;P&gt;Take one of the ports on your firewall and turn it into a TAP port, and place it in a zone called TAP. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;Now, have your L2/L3 switch mirror one (or more) firewall interfaces and feed that back into the TAP port on the firewall. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;When you want to log all instances of "ping", you can create a policy on your firewall that says "permit from TAP to TAP app=ping with logging enabled".&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;This comes at the cost of additional firewall CPU utilization, as the firewall will be forced to process the traffic twice. &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2016 14:38:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/report-based-logging-without-interfering-with-policies/m-p/71839#M40949</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2016-01-29T14:38:44Z</dc:date>
    </item>
    <item>
      <title>Re: Report-based Logging Without Interfering With Policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/report-based-logging-without-interfering-with-policies/m-p/71841#M40950</link>
      <description>&lt;P&gt;Hey guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the advice and ideas! I'll put in a request to support to consider this in the future. I'll look into the TAP solution as a means for now (though you're right it will up computational costs) as that didn't even cross my mind.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone reading this thread can feel free to continue the conversation as I'll be linking this in my support request.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2016 14:42:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/report-based-logging-without-interfering-with-policies/m-p/71841#M40950</guid>
      <dc:creator>joshuahiggins</dc:creator>
      <dc:date>2016-01-29T14:42:31Z</dc:date>
    </item>
  </channel>
</rss>

