<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trap SNMP for threat in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/trap-snmp-for-threat/m-p/12965#M9499</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bruno,&lt;BR /&gt;Please confirm the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you configured the Log forwarding settings in Objects tab? If not, you will have to create an entry to have SNMP traps occurs properly.&lt;/P&gt;&lt;P&gt;Click +Add to create a Log Forwarding Profile.&lt;/P&gt;&lt;P&gt;In this section, there are 2 sections to be forwarded: Traffic Settings and Threat Settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Each security policy can specify a log forwarding profile that determines whether traffic and threat log entries are logged remotely with Panorama, and/or sent as SNMP traps, syslog messages, or email notifications. By default, only local logging is performed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic logs record information about each traffic flow, and threat logs record the threats or problems with the network traffic, such as virus or spyware detection. Note that the antivirus, anti-spyware, and vulnerability protection profiles associated with each rule determine which threats are logged (locally or remotely).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under threats, you will notice the Severity levels.&amp;nbsp; You have to configure SNMP(ver 2 or 3) with a SNMP Trap, Email and or Syslog destination. And every option has detailed settings.Please see below information about the Thread log settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Threat Log Settings&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The severity levels are: &lt;/P&gt;&lt;P&gt;• Critical—Very serious attacks detected by the threat security engine. &lt;/P&gt;&lt;P&gt;• High—Major attacks detected by the threat security engine. &lt;/P&gt;&lt;P&gt;• Medium—Minor attacks detected by the threat security engine, including URL blocking. &lt;/P&gt;&lt;P&gt;• Low—Warning-level attacks detected by the threat security engine. &lt;/P&gt;&lt;P&gt;• Informational—All other events not covered by the other severity levels, including informational attack object matches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps answer your question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 25 Jan 2012 16:55:48 GMT</pubDate>
    <dc:creator>jdelio</dc:creator>
    <dc:date>2012-01-25T16:55:48Z</dc:date>
    <item>
      <title>Trap SNMP for threat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trap-snmp-for-threat/m-p/12964#M9498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the mib file named PAN-TRAPS.mib I can see that there are some information about threat objects.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there anybody who knows how to use this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried to generate some threats but no traps were sent to the manager.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bruno&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 11:01:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trap-snmp-for-threat/m-p/12964#M9498</guid>
      <dc:creator>brunoetienne91</dc:creator>
      <dc:date>2012-01-17T11:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: Trap SNMP for threat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trap-snmp-for-threat/m-p/12965#M9499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bruno,&lt;BR /&gt;Please confirm the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you configured the Log forwarding settings in Objects tab? If not, you will have to create an entry to have SNMP traps occurs properly.&lt;/P&gt;&lt;P&gt;Click +Add to create a Log Forwarding Profile.&lt;/P&gt;&lt;P&gt;In this section, there are 2 sections to be forwarded: Traffic Settings and Threat Settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Each security policy can specify a log forwarding profile that determines whether traffic and threat log entries are logged remotely with Panorama, and/or sent as SNMP traps, syslog messages, or email notifications. By default, only local logging is performed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic logs record information about each traffic flow, and threat logs record the threats or problems with the network traffic, such as virus or spyware detection. Note that the antivirus, anti-spyware, and vulnerability protection profiles associated with each rule determine which threats are logged (locally or remotely).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under threats, you will notice the Severity levels.&amp;nbsp; You have to configure SNMP(ver 2 or 3) with a SNMP Trap, Email and or Syslog destination. And every option has detailed settings.Please see below information about the Thread log settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Threat Log Settings&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The severity levels are: &lt;/P&gt;&lt;P&gt;• Critical—Very serious attacks detected by the threat security engine. &lt;/P&gt;&lt;P&gt;• High—Major attacks detected by the threat security engine. &lt;/P&gt;&lt;P&gt;• Medium—Minor attacks detected by the threat security engine, including URL blocking. &lt;/P&gt;&lt;P&gt;• Low—Warning-level attacks detected by the threat security engine. &lt;/P&gt;&lt;P&gt;• Informational—All other events not covered by the other severity levels, including informational attack object matches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps answer your question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jan 2012 16:55:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trap-snmp-for-threat/m-p/12965#M9499</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2012-01-25T16:55:48Z</dc:date>
    </item>
    <item>
      <title>Re: Trap SNMP for threat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trap-snmp-for-threat/m-p/12966#M9500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I do have the same problem. After a snmpwalk, I receive about 380 OID's. But the OID's which are provided by Palo Alto, refering to PAN-TRAPS are not available and not shown through snmpwalk.&lt;/P&gt;&lt;P&gt;How can I get the threat, virus, or any other snmp related trap.?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Jan 2012 00:52:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trap-snmp-for-threat/m-p/12966#M9500</guid>
      <dc:creator>bable</dc:creator>
      <dc:date>2012-01-29T00:52:29Z</dc:date>
    </item>
  </channel>
</rss>

