Error:
An unexpected error occurred. Please click Reload to try again.
Error:
An unexpected error occurred. Please click Reload to try again.
How To Setup Syslog Monitoring Over TLS - Knowledge Base - Palo Alto Networks

How To Setup Syslog Monitoring Over TLS

54841
Created On 01/14/21 17:27 PM - Last Modified 03/21/22 23:16 PM


Objective


This article walks through on how to set up a Syslog monitoring profile over TLS.

When Syslog over TLS is enabled, the firewall serves as the client, the process requires a trusted Root CA to sign the client and the server certificate.
The Syslog server uses the certificate to verify that the firewall is authorized to communicate with the Syslog server.
The Syslog server and the sending firewall must have certificates that the same trusted certificate authority (CA) signed. 
Alternatively, you can generate a self-signed certificate on the firewall, export the certificate from the firewall, and import it into the Syslog server.


Environment


  • PAN-OS
  • Firewall
  • Panorama
  • Syslog servers


Procedure


Generate a client certificate
  1. On the firewall, generate a certificate to be used for client authentication. Note that the CN for this certificate must match the IP address of the firewall's interface set for Syslog connectivity.
  2. Once the certificate is generated, click on the certificate name to open the properties.
  3. Check the "Certificate for Secure Syslog" option on the certificate. This will mark the certificate to be used for SSL handshake.
Syslog client certificate
  1. Click OK.

Create the Syslog profile
  1. Go to Device> Server Profile> Syslog
  2. Click add
  3. Specify a name for the profile
  4. Under the Syslog server, enter the FQDN/IP address of the Syslog server.
  5. For the transport field, select SSL. The port number is automatically populated (Default port is 6514)
  6. Select the format and facility as required.
  7. Click Ok
Syslog Profile

Generate the Syslog certificate
If you are using a self-sign certificate, Generate a server certificate signed by the same root CA as the client certificate,
  1. Go to Device> Certificate
  2. Click Generate.
  3. Specify a name for the certificate.
  4. For the common name, specify the same FQDN/IP address used in the Syslog profile.
  5. Specify other attributes as required.
  6. Click generate.
  7. Export this certificate with the private key and import it to the Syslog server.
  8. Commit your changes


Additional Information


Monitor the system log for a successful connection or for any errors.
Note: On the Syslog server, set the custom certificate to be used for Syslog SSL authentication.

For more details, visit Configure Syslog monitoring.
 


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HCLCCA4&lang=en_US%E2%80%A9&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language