<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat log original destination required in vm firewall deployed in aws in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/threat-log-original-destination-required-in-vm-firewall-deployed/m-p/335675#M84599</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/141518"&gt;@omprasadax&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You won't be able to get the destination of the actual server if this is being fed through the ALB; as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42079"&gt;@DelvinC&lt;/a&gt;&amp;nbsp;initially mentioned, the firewalls visibility into the traffic stops once the packet reaches the ALB. You will need to have some sort of SIEM (Like Cortex, Splunk, Graylog, ect) to aggregate these logs if you don't want to manually corelate them.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 28 Jun 2020 03:30:19 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2020-06-28T03:30:19Z</dc:date>
    <item>
      <title>Threat log original destination required in vm firewall deployed in aws ..</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-log-original-destination-required-in-vm-firewall-deployed/m-p/334744#M84419</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;We have VM firewall deployed at AWS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; Paloalto&amp;gt;&amp;gt;ALB&amp;gt;&amp;gt; servers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now in threat log we are getting logs for destination as ALB&amp;nbsp; because of this architecture.&lt;/P&gt;&lt;P&gt;Is it possible to get logs for actual destination server in threat log by any means ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanking you in advance!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jun 2020 09:30:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-log-original-destination-required-in-vm-firewall-deployed/m-p/334744#M84419</guid>
      <dc:creator>omprasadax</dc:creator>
      <dc:date>2020-06-23T09:30:28Z</dc:date>
    </item>
    <item>
      <title>Re: Threat log original destination required in vm firewall deployed in aws</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-log-original-destination-required-in-vm-firewall-deployed/m-p/334915#M84447</link>
      <description>&lt;P&gt;I don' think you can&amp;nbsp;&lt;SPAN&gt;get logs for actual destination server in the threat logs on the virtual firewall. The virtual firewall's visibility does not go beyond the ALB based on the setup that you have. In the give scenario, you'll need to correlate the timestamps on the virtual firewall and the ALB logs to identify the original destination server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;Another alternative is if you are using &lt;A href="https://www.paloaltonetworks.com/cortex/cortex-xdr" target="_self"&gt;Cortex-XDR&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2020 03:12:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-log-original-destination-required-in-vm-firewall-deployed/m-p/334915#M84447</guid>
      <dc:creator>DelvinC</dc:creator>
      <dc:date>2020-06-24T03:12:40Z</dc:date>
    </item>
    <item>
      <title>Re: Threat log original destination required in vm firewall deployed in aws</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-log-original-destination-required-in-vm-firewall-deployed/m-p/335178#M84484</link>
      <description>&lt;P&gt;If SSL inbound inspection configured in this case then will it be meaningful?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jun 2020 04:09:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-log-original-destination-required-in-vm-firewall-deployed/m-p/335178#M84484</guid>
      <dc:creator>omprasadax</dc:creator>
      <dc:date>2020-06-25T04:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: Threat log original destination required in vm firewall deployed in aws</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-log-original-destination-required-in-vm-firewall-deployed/m-p/335610#M84581</link>
      <description>&lt;P&gt;If we were to look at this problem from a different perspective, what are we trying to achieve by looking at the threat logs? Are you just looking to block the threats or identify the impacted server?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jun 2020 21:05:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-log-original-destination-required-in-vm-firewall-deployed/m-p/335610#M84581</guid>
      <dc:creator>DelvinC</dc:creator>
      <dc:date>2020-06-26T21:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Threat log original destination required in vm firewall deployed in aws</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-log-original-destination-required-in-vm-firewall-deployed/m-p/335652#M84590</link>
      <description>&lt;P&gt;Yes, &lt;STRONG&gt;we want to identify impacted server&lt;/STRONG&gt; then if required we would take any other action&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jun 2020 04:56:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-log-original-destination-required-in-vm-firewall-deployed/m-p/335652#M84590</guid>
      <dc:creator>omprasadax</dc:creator>
      <dc:date>2020-06-27T04:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: Threat log original destination required in vm firewall deployed in aws</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-log-original-destination-required-in-vm-firewall-deployed/m-p/335675#M84599</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/141518"&gt;@omprasadax&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You won't be able to get the destination of the actual server if this is being fed through the ALB; as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/42079"&gt;@DelvinC&lt;/a&gt;&amp;nbsp;initially mentioned, the firewalls visibility into the traffic stops once the packet reaches the ALB. You will need to have some sort of SIEM (Like Cortex, Splunk, Graylog, ect) to aggregate these logs if you don't want to manually corelate them.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jun 2020 03:30:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-log-original-destination-required-in-vm-firewall-deployed/m-p/335675#M84599</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-06-28T03:30:19Z</dc:date>
    </item>
  </channel>
</rss>

