Reading firewall palo A20 logs

Reply
L1 Bithead

Reading firewall palo A20 logs

Hello Paloalto community,

 

I ask for help please, I collect the logs of a Firewall palo lato A20  with graylog, I find a difficulty in reading Firewall logs. Can anyone help me to explain this logs, I want a clear interpretation of this logs.

On the web interface of Graylog I see this logs from FW Palo alto:

 1/ All the logs of the FW palo  are "level6", what does mean "level 6" ?

2/ Facility ( local 0, local 6, user-level) ???

3/ log_subtype, url_category ( any) ? , " session_flags =" 0x1b", " 0x10001c " ", ?

4/ repeat_cout=1 , time generated ???

 Please I want a clear interpretation F LOGS.PNG

Thanks ,

AYOUB LABIDI 

Tags (3)
Community Manager

Re: Reading firewall palo A20 logs

You will want to compare the logs you receive to the actual logs on the firewalls, they'll make much more sense to you then

Afaik lvl6 is informational, facility is configured in the log forwarding profile, subtype is the subtype (url threat traffic wildfire,...) repeat count is the nu ber of tines an identical log was counted in a short timeframe

Help the community: Like helpful comments and mark solutions
Reaper out
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!