# Palo Alto Networks Firewall

In this guide, you will create custom log formats for Palo Alto’s syslog log configuration. This is required in order to send Palo Alto logs to Radiant Security without the use of an intermediary syslog relay server. These custom log formats will be provided by Radiant Security and are specific to your configuration.

{% hint style="warning" %}
If you will be forwarding Palo Alto Networks logs to Radiant using a **Radiant Agent**, please refer to [this other article](https://help.radiantsecurity.ai/radiant-connectors/data-connectors/palo-alto-networks-firewall-via-radiant-agent) instead.
{% endhint %}

### Prerequisites

* [ ] Palo Alto: `Administrator`

### Add the data connector in Radiant Security

First, you’ll add the Palo Alto Networks Firewall data connector in Radiant Security to create a certificate that you’ll use to create the syslog server in Palo Alto.

1. Log in to [Radiant Security](https://app.radiantsecurity.ai/)
2. From the navigation menu, click **Settings** > **Data Connectors** and click **+ Add Connector**.
3. Search for and select the **Palo Alto Networks Firewall** option and then click **Data Feeds.**
4. Under S**elect your data feeds**, select the **Palo Alto Firewall 9.1** data feed and then click **Credentials.**
5. Under **Credential Name,** give the credential an identifiable name (e.g. `PAN Credentials`). If you already have a credential in place, select it from the drop-down menu.
6. Enter a value for **Connector** **tag** (optional.)
7. Click **Add Connector.**
8. Download the **SSL Certificate** and **Custom Log** files, as they will be used in upcoming sections.
9. Click **Done** to save your changes.

### Upload the certificate

1. Login to your Palo Alto firewall.
2. On the top navigation bar, click **Device.**

<figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FOaJ1UirR7BDkECa1eqdl%2FPalo_Alto_Networks_Syslog_05.webp?alt=media&#x26;token=c821f57b-9336-4b8c-a348-50c3ddd0c85f" alt=""><figcaption></figcaption></figure>

3. On the left navigation list, expand **Certificate Management** and click **Certificates.**

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FBHAmPEUtv1IGwoP5SjkJ%2FPalo_Alto_Networks_Syslog_06.webp?alt=media&#x26;token=47b0361f-3b81-4317-a79c-afc9a4ffb71b" alt=""><figcaption></figcaption></figure></div>

4. At the bottom of the right pane, click **Import**.

<figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FDRNTJOBxsLllbTdJKmF0%2FPalo_Alto_Networks_Syslog_07.webp?alt=media&#x26;token=469a51bd-9055-4285-8631-0f7915263f3e" alt=""><figcaption></figcaption></figure>

5. Under **Import** **Certificate**, fill in the following details:
   * **Certificate Name**: `Radiant Security Syslog CA`
   * **Certificate File**: Upload the certificate file that you created and saved in the previous section
   * **File Format**: Base64 Encoded Certificate (PEM)

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FaPrFJgCjrRLqXWJ6mLXY%2FPalo_Alto_Networks_Syslog_08.webp?alt=media&#x26;token=fae4e14f-9ebb-4b17-902d-cd1e3d50b6e4" alt=""><figcaption></figcaption></figure></div>

6. Click **OK** to save the CA certificate.

### Configure the syslog server

1. On the left navigation list, expand **Server Profiles** and click **Syslog.**

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FR6Rzbori1qbjrL7LkEJr%2FPalo_Alto_Networks_Syslog_09.webp?alt=media&#x26;token=2c1ae41a-2ef1-41d5-a157-4ccf6ffb5d9e" alt="" width="187"><figcaption></figcaption></figure></div>

2. At the bottom of the right pane, click **Add.**

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FFKoq07XUiNtc14QC2wla%2FPalo_Alto_Networks_Syslog_10.webp?alt=media&#x26;token=f95bb8d0-964d-450a-9c3a-6b88001654e0" alt=""><figcaption></figcaption></figure></div>

3. Under **Syslog** **Server** **Profile**, fill in the following details:

   * Name: `RadiantSecurity`

   Click **Add** to add a server and populate with the following values:

   * **Name**: `Primary`
   * **Syslog Server**: `cluster.syslog.radiantsecurity.ai`&#x20;
   * **Transport**: `SSL`
   * **Port**: `6514`

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2Fwx8iobB6h0snAcqcFRd7%2FPalo_Alto_Networks_Syslog_11.webp?alt=media&#x26;token=ff80ecf4-da56-44e3-af37-15eb7bd4ae36" alt="" width="328"><figcaption></figcaption></figure></div>

4. Then, click the **Custom Log Format** tab.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2Fq2mJPp6x4LLMLAL2hZsH%2FPalo_Alto_Networks_Syslog_12.webp?alt=media&#x26;token=c5faf117-56a8-4d75-a05e-9d51b510a2fc" alt="" width="375"><figcaption></figcaption></figure></div>

5. In the **Log** **Type** column, for each **Log** **Type** click on the name and paste the corresponding log format for that log type on the **Config** **Log** Format text box. The log formats can be found in the **Custom** **Log** file that you created during the data connector setup.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F1RnwYQ8RoT5ZvUyxvt4f%2FPalo_Alto_Networks_Syslog_13.webp?alt=media&#x26;token=913423c9-287f-43e1-b3d1-9f615c8c0b0d" alt="" width="375"><figcaption></figcaption></figure></div>

5. Click **OK** to save the configuration.
6. Repeat **steps 2-6** for all 14 **Log Types**.
7. Once all 14 Log Types have been updated, click **OK** on the syslog configuration screen.

### Configure log settings

1. On the left navigation list, under **Certificate** **Management**, click **Log Settings.**

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FSxsljsSvJ9nyJrrdvre7%2FPalo_Alto_Networks_Syslog_14.webp?alt=media&#x26;token=e9c3b1a4-5d0a-4120-af1b-ba1e9e27690a" alt=""><figcaption></figcaption></figure></div>

2. In each box for **System**, **Configuration**, **User-ID**, **HIP Match**, **GlobalProtect**, and **IP-Tag** complete the following:
   * Click **Add**.
   * Under **Log** **Settings - System**, fill in the following details:
     * **Name**: Radiant Security
     * **Filter**: All Logs
     * Under **Syslog**, Click **Add** and select the **Syslog Server Profile** (**RadiantSecurity**) that you created in the previous section
   * Click **OK** to save and repeat **step 2** for each firewall log: **System**, **Configuration**, **User-ID**, **HIP** **Match**, **GlobalProtect**, and **IP-Tag**.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2Fmx6msL8WM9WjKr8Zo1Qf%2FPalo_Alto_Networks_Syslog_15.webp?alt=media&#x26;token=238bc4f1-959c-4833-bd9d-6fac4ecc2df2" alt=""><figcaption></figcaption></figure></div>

### Configure syslog log forwarding

{% hint style="info" %}
**Note**: If log forwarding is already configured on your firewall, add the newly created Radiant Security syslog server to the existing log forwarding profile *without removing any current settings*. This ensures that syslog messages are sent to both destinations simultaneously.
{% endhint %}

1. On the top navigation bar, click **Objects**.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F6RD6uuRspd1bWpmfqBNW%2FPalo_Alto_Networks_Syslog_16.webp?alt=media&#x26;token=5ae76a9e-b948-4275-9a0d-cb88ae34dc03" alt=""><figcaption></figcaption></figure></div>

2. On the left navigation list, under **Security Profiles**, click **Log Forwarding.**

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FxYZygg6l32aNEI9AfZ2x%2FPalo_Alto_Networks_Syslog_17.webp?alt=media&#x26;token=00aaf879-c69c-42d4-b39d-2bd56c4bdc92" alt=""><figcaption></figcaption></figure></div>

3. At the bottom of the right pane, click **Add.** If log forwarding is already configured on your firewall, instead of adding a new profile, **Edit** the current one.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FM9k0AtOEvyZm4whBC1Ab%2FPalo_Alto_Networks_Syslog_18.webp?alt=media&#x26;token=1a99f09f-4b58-4866-92be-7574044e3790" alt=""><figcaption></figcaption></figure></div>

4. Under **Log** **Forwarding** **Profile**, fill in the following details:
   * **Name**: Radiant Security Log Profile

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FWplqgvn25BqQJC6UsxY4%2FPalo_Alto_Networks_Syslog_19.webp?alt=media&#x26;token=165c3ff3-dad4-472a-9821-8dc26d3efd3a" alt="" width="375"><figcaption></figcaption></figure></div>

5. Then click **Add** to add a log forwarding profile match. In the **Log Forwarding Profile Match List** pane, for each **Log Type** fill in the following details.&#x20;

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F93uc4X9ErAoUr0Wn1EiK%2FPalo_Alto_Networks_Syslog_20.webp?alt=media&#x26;token=b30d0a8f-1ee7-46ea-9b2f-9c87214718cf" alt="" width="375"><figcaption></figcaption></figure></div>

* Note that if the existing log forwarding profile doesn't have all the **Log** **Types** selected then follow the steps below to add them to the profile.
  * **Name**: Use the same name as the **Log Type**
  * **Panorama**: Enable this option if you use Panorama for log forwarding
  * Under **Syslog**, click **Add** and select the syslog profile (**RadiantSecurity**) that you created in the previous section
  * Click **OK** to save the configuration

6. Once all Log Types are added, click **OK** to save on the **Log Forwarding Profile** pane.
7. Now to assign the **Log** **Forwarding** **profile** to policy rules, navigate to **Policies** > **Security**. Complete the following steps for each rule that you want to trigger log forwarding to Radiant Security:
   * Edit the rule.
   * Select **Actions** and select the **Radiant Security Log Forwarding** profile.
   * For **Traffic Logs**, select **Log at Session End**.
   * For **Threat Logs**, select the security profile required to trigger log generation.
8. Remember to commit the changes by clicking the **Commit** button in the upper right hand corner.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F6jDmytFOU5K7zduNgppN%2FPalo_Alto_Networks_Syslog_21.webp?alt=media&#x26;token=be239ebd-eb13-4e00-b32e-e3fd89474530" alt=""><figcaption></figcaption></figure></div>

9. Once the **Commit Status** progress is completed, the configured syslog formats will be used to send logs to Radiant Security.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FzKWmteFRxUKSS0f57lJo%2FPalo_Alto_Networks_Syslog_22.webp?alt=media&#x26;token=e3eefec7-430c-4d35-a0fb-fa9b9a9312a4" alt="" width="375"><figcaption></figcaption></figure></div>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://help.radiantsecurity.ai/radiant-connectors/data-connectors/palo-alto-networks-firewall.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
