Palo Alto Network's next-generation firewalls provide network security by enabling enterprises to see and control applications, users, and content—not just ports, IP addresses, and packets—using three unique identification technologies: App-ID, User-ID, and Content-ID. These technologies enable enterprises to create business-relevant security policies that safely enable the adoption of new applications, instead of the traditional “all-or-nothing” approach offered by traditional port-blocking firewalls used in many security infrastructures. With CEF integration Palo Alto Networks firewalls can generate Traffic, Threat, System, Config, and HIP Match logs in CEF format. Micro Focus has tested these CEF logs to ensure accuracy and format compliance, thus, enabling ArcSight customers to seamlessly utilize the rich data generated by PAN-OS gateways.
Suggested for you are based on app category, product compatibility, popularity, rating and newness. Some apps may not show based on entitlements. Learn more about entitlements.
This guide provides information for configuring the Palo Alto Networks next-generation firewalls for CEFformatted Syslog event collection.
This guide provides information for configuring the Palo Alto Networks next-generation firewalls for CEFformatted Syslog event collection.
Solution brief!
This guide provides information for configuring the Palo Alto Networks next-generation firewalls for CEF-formatted Syslog event collection. There are several fields referenced in this document that are only available in PAN-OS 8.0 and higher. If you are using a PAN-OS version older than 8.0, please use the appropriate CEF guide that aligns with your software version.
Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox