Firewalls are architected to safely enable applications and prevent modern threats. It identifies all network traffic based on applications, users, content and devices. The firewall(s) and another security device initiate and terminate VPN connections across the two networks. To set up the VPN tunnel and send traffic between the IKE Gateways, each peer must have an IP address—static or dynamic—or FQDN. The VPN peers use preshared keys or certificates to mutually authenticate each other.
Using Panorama by Palo Alto Networks?
Configure Panorama as a firewall, using the steps below.
Before You Begin
You must configure log forwarding for Palo Alto in order to collect the logs. You can read directions on how to do so on their website here: https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/monitoring/configure-log-forwarding.
How to Configure This Event Source in InsightIDR
- From your dashboard, select Data Collection on the left hand menu.
- When the Data Collection page appears, click the Setup Event Source dropdown and choose Add Event Source.
- From the “Security Data” section, click the Firewall icon. The “Add Event Source” panel appears.
- Choose your collector and event source. You can also name your event source if you want.
- Choose the timezone that matches the location of your event source logs.
- Optionally choose to send unfiltered logs.
- Configure your default domain and any Advanced Event Source Settings.
- Select a collection method and specify a port and a protocol.
- Optionally choose to Encrypt the event source if choosing TCP by downloading the Rapid7 Certificate.
- Click Save.
Forward Palo Alto Traffic Logs to Syslog Server
You can learn about how to configure log forwarding in Palo Alto here:
VPN and Wildfire logs
The Palo Alto event source includes firewall, VPN, and Wildfire logs.
If you are receiving firewall logs but not VPN logs, confirm that system logs are turned on and configured to forward to syslog. For more information, see https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/monitoring/view-and-manage-logs/log-types-and-severity-levels/system-logs.html.
To configure log forwarding to syslog follow these steps:
- Under the Device tab, navigate to Server Profiles > Syslog
- Click Add to configure the log destination on the Palo Alto Network. You will need to enter the:
- Name for the syslog server
- Syslog server IP address
- Port number (change the destination port to the port on which logs will be forwarded; it is UDP 514 by default)
- Format (keep the default log format, BSD)
- Click OK and your server profile will be created.
For more information, visit: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRxCAK