<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Network Outbound baseline. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/network-outbound-baseline/m-p/194969#M58282</link>
    <description>&lt;P&gt;I need to provide a baseline of allowed traffic outbound for a period of time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So to list&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client -&amp;gt; External Server&amp;nbsp;[ Port/Application ]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a report on the PA-3020 that can be crafted to do this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jan 2018 17:10:08 GMT</pubDate>
    <dc:creator>RobinClayton</dc:creator>
    <dc:date>2018-01-12T17:10:08Z</dc:date>
    <item>
      <title>Network Outbound baseline.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/network-outbound-baseline/m-p/194969#M58282</link>
      <description>&lt;P&gt;I need to provide a baseline of allowed traffic outbound for a period of time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So to list&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client -&amp;gt; External Server&amp;nbsp;[ Port/Application ]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a report on the PA-3020 that can be crafted to do this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2018 17:10:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/network-outbound-baseline/m-p/194969#M58282</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2018-01-12T17:10:08Z</dc:date>
    </item>
    <item>
      <title>Re: Network Outbound baseline.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/network-outbound-baseline/m-p/194978#M58285</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;A 'User Activity Report' might be what you are after. But if its to a specific exteranl IP and/or port, a custom report might be a better method. If this is a one time thing, perhaps the Unified logs would give you what you are looking for?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2018 17:20:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/network-outbound-baseline/m-p/194978#M58285</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-12T17:20:06Z</dc:date>
    </item>
    <item>
      <title>Re: Network Outbound baseline.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/network-outbound-baseline/m-p/194988#M58287</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71756"&gt;@RobinClayton&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Sure. I've provided a sample of a custom report that could be utilized for a 24hr period as an example. The example simply shows traffic going to opendns with the application being dns.&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;      &amp;lt;entry name="Test-Outbound"&amp;gt;
        &amp;lt;type&amp;gt;
          &amp;lt;trsum&amp;gt;
            &amp;lt;sortby&amp;gt;bytes&amp;lt;/sortby&amp;gt;
            &amp;lt;group-by&amp;gt;dst&amp;lt;/group-by&amp;gt;
            &amp;lt;aggregate-by&amp;gt;
              &amp;lt;member&amp;gt;from&amp;lt;/member&amp;gt;
              &amp;lt;member&amp;gt;to&amp;lt;/member&amp;gt;
              &amp;lt;member&amp;gt;app&amp;lt;/member&amp;gt;
              &amp;lt;member&amp;gt;src&amp;lt;/member&amp;gt;
            &amp;lt;/aggregate-by&amp;gt;
            &amp;lt;values&amp;gt;
              &amp;lt;member&amp;gt;sessions&amp;lt;/member&amp;gt;
              &amp;lt;member&amp;gt;bytes&amp;lt;/member&amp;gt;
              &amp;lt;member&amp;gt;nunique-of-apps&amp;lt;/member&amp;gt;
            &amp;lt;/values&amp;gt;
          &amp;lt;/trsum&amp;gt;
        &amp;lt;/type&amp;gt;
        &amp;lt;period&amp;gt;last-24-hrs&amp;lt;/period&amp;gt;
        &amp;lt;topn&amp;gt;500&amp;lt;/topn&amp;gt;
        &amp;lt;topm&amp;gt;50&amp;lt;/topm&amp;gt;
        &amp;lt;caption&amp;gt;Test-Outbound&amp;lt;/caption&amp;gt;
        &amp;lt;query&amp;gt;(addr.src in 192.168.0.0/16) and ( (addr.dst eq 208.67.222.222) and (app eq dns) )&amp;lt;/query&amp;gt;
      &amp;lt;/entry&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13207iE1761ADDF4674100/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2018 18:12:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/network-outbound-baseline/m-p/194988#M58287</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-01-12T18:12:29Z</dc:date>
    </item>
    <item>
      <title>Re: Network Outbound baseline.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/network-outbound-baseline/m-p/195121#M58329</link>
      <description>&lt;P&gt;I need all unique instances of allowed traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;192.168.1.5 - 8.8.8.8 - DNS&lt;/P&gt;&lt;P&gt;192.168.1.5 - 8.8.4.4 - DNS&lt;/P&gt;&lt;P&gt;192.168.1.6 - 8.8.8.8&amp;nbsp;- DNS&lt;/P&gt;&lt;P&gt;192.168.1.5 - 8.8.8.8 - https&lt;/P&gt;&lt;P&gt;&lt;STRIKE&gt;192.168.1.5 - 8.8.8.8 - DNS&lt;/STRIKE&gt;&lt;/P&gt;&lt;P&gt;192.168.1.6 - 178.16.40.90 - https&lt;/P&gt;&lt;P&gt;&lt;STRIKE&gt;192.168.1.6 - 8.8.8.8&amp;nbsp;- DNS&lt;/STRIKE&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So that no entries are repeated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jan 2018 09:32:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/network-outbound-baseline/m-p/195121#M58329</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2018-01-15T09:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: Network Outbound baseline.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/network-outbound-baseline/m-p/195134#M58334</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71756"&gt;@RobinClayton&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Really isn't an amazing way to do this from a custom report then. Since you are locating DNS traffic you're going to be looking at a&amp;nbsp;&lt;STRONG&gt;lot&lt;/STRONG&gt; of sessions and you'll quickly reach the limits on how large the custom reports can actually be. Your best bet to fullfil this is likely going to be simply filtering the 'traffic' or 'unified' logs and simply exporting the results.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Depending on what you are looking to do with this information you could simply seperate the queries based off of source address, or run all the queries individually.&amp;nbsp;&lt;/P&gt;&lt;P&gt;( ( addr.src in 192.168.1.5 ) and ( addr.dst in 8.8.8.8 ) and ( app eq dns ) ) or ( ( addr.src in 192.168.1.5 ) and ( addr.dst in 8.8.4.4 ) and ( app eq dns ) ) or ( ( addr.src in 192.168.1.6 ) and ( addr.dst in 8.8.8.8 ) and ( app eq dns ) ) or ( ( addr.src in 192.168.1.5 ) and ( addr.dst in 8.8.8.8 ) and ( port.dst eq 443 ) ) or ( ( addr.src in 192.168.1.6 ) and ( addr.dst in 178.16.40.90 ) and ( port.dst eq 443 ) )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You'll notice that the queries for the https traffic I simply did a destination port of 443. This is because I simply didn't know what the application would usually return as. Likely the app would be SSL on either, but you'd either want to run it simply as the dst port search or actually verify in the logs what that traffic is getting identified as and switch it out in the query.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jan 2018 13:52:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/network-outbound-baseline/m-p/195134#M58334</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-01-15T13:52:04Z</dc:date>
    </item>
  </channel>
</rss>

