I have to get this out of the way first: Please upgrade to a more current code version. 8.0.9 was released over a year ago and has several vulnerabilities at medium or high priority. Unpatched devices are the most common vectors for attacks. Also, 8.0 has six months before it is End of Life as well, so that might be a good opportunity to begin upgrading to 8.1, which is supported on the PA-5000 series until 2024. PAN-SA-2019-0002 (High). Cross site scripting (XSS) vulnerability in the management interface. Fixed in 8.0.15. PAN-SA-2018-0008 (High). Denial of Service (DoS) in the management interface. Fixed in 8.0.10. PAN-SA-2018-0009 (medium). XSS in the GP login page. Fixed in 8.0.11. PAN-SA-2018-0015 (medium). OpenSSL vulnerabilities. Fixed in 8.0.13. PAN-SA-2018-0012 (medium). FragmentSmack vulnerability. Fixed in 8.0.13. PAN-SA-2019-0001 (medium). XSS in external dynamic lists. Fixed in 8.0.15. PAN-SA-2019-0007 (medium). DoS in the management interface. Fixed in 8.0.16. With that said, it depends on how much logging you are doing. Check your logging rate (debug log-receiver statistics) to see where you're at for logs/second. Even with aggressive cleaning the system may simply be getting so many logs it cannot keep up. You may be able to reduce that as well. Make sure you're not logging at session start, don't log on the default deny rule (logging is disabled by default on it). You may also want to exclude logging for things like NTP, DNS, Ping, etc. by disabling the 'log at session end' in a rule dedicated just to that type of traffic.
... View more