

# Palo Alto Networks Next-Generation Firewalls integration configuration
Palo Alto Networks Next-Generation Firewalls

CloudWatch pipelines enables you to collect network security logs from Palo Alto Networks Next-Generation Firewalls. Palo Alto Networks provides network security solutions, including firewall, VPN, and threat detection services.

**Topics**
+ [

# Source configuration for Palo Alto Networks Next-Generation Firewalls
](paloalto-ngfw-source-setup.md)
+ [

# CloudWatch pipelines configuration for Palo Alto Networks Next-Generation Firewalls
](paloalto-ngfw-pipeline-setup.md)

# Source configuration for Palo Alto Networks Next-Generation Firewalls
Source configuration

## Integrating with Palo Alto Networks Next-Generation Firewalls


CloudWatch Pipeline integrates with Palo Alto Networks NGFW using the PAN-OS XML API to retrieve security, authentication, network activity, process activity, detection finding and threat activity. The PAN-OS XML API enables structured access, allowing the retrieval of System Logs, GlobalProtect, Traffic Logs, Threat Logs and URL Filtering Log.

## Authenticating with Palo Alto NGFW


To read network security logs, the pipeline needs to authenticate with your Palo Alto Networks NGFW login device interface. The plugin supports Basic Authentication.
+ Create and Manage Users on a Palo Alto Networks NGFW Firewall via CLI
+ Login firewall using with hostname using user admin and your password
+ Store this username and password in a secret in AWS Secrets Manager under the keys `username` and `password`.
+ Identify and note down your PAN-OS hostname.

Once configured, the pipeline can authenticate using the username and password and retrieve log activity from PAN-OS.

## Configuring the CloudWatch Pipeline


When configuring the pipeline to read logs from Palo Alto Networks NGFW, choose Palo Alto Networks Next-Generation Firewalls as the data source. Fill in the required information like `hostname`. Once you create the pipeline, data will be available in the selected CloudWatch Logs log group.

## Supported Open Cybersecurity Schema Framework Event Classes


This integration supports OCSF schema version v1.5.0 and events that map to Authentication (3002), Network Activity (4001), Process Activity (1007), and Detection Finding (2004).

**Authentication** contains the following type and subtypes:
+ GlobalProtect
  + data
  + file
  + flood
  + packet
  + scan
  + spyware
  + url
  + virus
  + vulnerability
  + wildfire
  + wildfire-virus
+ System Logs
  + auth

**Network Activity** contains the following types and subtypes:
+ Traffic Logs
  + start
  + end
  + drop
  + deny
+ System Logs
  + vpn
  + url-filtering
  + app-cloud-engine
  + dhcp
  + ssh
  + dnsproxy
  + dns-security
  + wildfire
  + wildfire-appliance
  + ntpd
  + userid

**Process Activity** contains the following type and subtypes:
+ System Logs
  + general
  + satd
  + ras
  + sslmgr
  + hw
  + iot
  + ctd-agent
  + routing
  + port
  + device-telemetry

**Detection Finding** contains the following type and subtypes:
+ Threat Logs
  + data
  + file
  + flood
  + packet
  + scan
  + spyware
  + url
  + ml-virus
  + virus
  + vulnerability
  + wildfire
  + wildfire-virus
+ URL Filtering Log

# CloudWatch pipelines configuration for Palo Alto Networks Next-Generation Firewalls
Pipeline configuration

Collects log data from Palo Alto Next-Generation Firewall using basic authentication.

Configure the Palo Alto NGFW source with the following parameters:

```
source:
  palo_alto_ngfw:
    hostname: "<example-host-name>"
    authentication:
      basic:
        username: "${{aws_secrets:<secret-name>:username}}"
        password: "${{aws_secrets:<secret-name>:password}}"
```Parameters

`hostname` (required)  
The Palo Alto NGFW hostname for your firewall.

`authentication.basic.username` (required)  
Basic authentication username for Palo Alto NGFW API authentication.

`authentication.basic.password` (required)  
Basic authentication password for Palo Alto NGFW API authentication.