Overview
SafeNetworking receives THREAT, TRAFFIC, GTP, and SCTP syslog events from Palo Alto Networks Next-Generation Firewalls (NGFWs). This guide covers the configuration required on your firewall to send logs to SafeNetworking for processing and threat intelligence enrichment.SafeNetworking uses the Palo Alto Networks Threat Intelligence Cloud to correlate threat logs (primarily DNS queries) with known malware.
Prerequisites
- Palo Alto Networks NGFW running PAN-OS 8.x or 9.x
- Network connectivity from firewall to SafeNetworking host
- SafeNetworking installed and running
Required Log Types
SafeNetworking processes the following log types:THREAT Logs
DNS queries, spyware, vulnerability, and wildfire events
TRAFFIC Logs
Network traffic flows and connections (optional)
GTP Logs
Mobile carrier GTP tunnel events
SCTP Logs
SCTP association and signaling events
Syslog Server Ports
Configure your firewall to send logs to the SafeNetworking host on the following UDP ports:| Log Type | UDP Port | Pipeline | Description |
|---|---|---|---|
| THREAT/TRAFFIC/SYSTEM/CONFIG | 5514 | threat | Main threat and traffic logs |
| GTP/SCTP | 5516 | gtp | Mobile carrier logs |
| IoT External | 5510 | iot | External IoT device alerts |
Syslog Configuration
Step 1: Create Syslog Server Profile
- Navigate to Device > Server Profiles > Syslog
- Click Add to create a new profile
- Enter a name (e.g.,
SafeNetworking-Threat) - Add a server:
- Name:
SafeNetworking-Primary - Syslog Server: IP address of SafeNetworking host
- Transport: UDP
- Port: 5514 (for THREAT/TRAFFIC logs)
- Format: BSD (default)
- Facility: LOG_USER (default)
- Name:
Step 2: Create Log Forwarding Profile
- Navigate to Objects > Log Forwarding
- Click Add to create a new profile
- Enter a name (e.g.,
SafeNetworking-Forwarding) - Add log types:
THREAT Logs
- Click Add under Threat
- Name:
Threat-to-SafeNetworking - Filter: All threat severities
- Syslog Profile: Select
SafeNetworking-Threat - Enable Send to Syslog
TRAFFIC Logs (Optional)
As of SafeNetworking v4.0, TRAFFIC logging is disabled by default. Enable only if specifically needed.
- Click Add under Traffic
- Name:
Traffic-to-SafeNetworking - Log Type: End (session end)
- Syslog Profile: Select
SafeNetworking-Threat - Enable Send to Syslog
GTP Logs
- Click Add under GTP
- Name:
GTP-to-SafeNetworking - Syslog Profile: Select
SafeNetworking-GTP - Enable Send to Syslog
Step 3: Apply to Security Policies
Attach the log forwarding profile to your security policies:- Navigate to Policies > Security
- Edit the policies where you want threat logging
- Under Actions tab:
- Log Setting: Select
SafeNetworking-Forwarding - Enable Log at Session End
- Log Setting: Select
- Click OK and commit changes
DNS Threat Configuration
For SafeNetworking to properly correlate DNS threats, configure your Anti-Spyware profiles:Anti-Spyware Profile Settings
- Navigate to Objects > Security Profiles > Anti-Spyware
- Select or create a profile
- Configure DNS Security:
- Enable DNS Security
- Action: Alert or Block (based on your security policy)
- Enable logging for DNS categories
DNS Sinkhole Configuration
DNS sinkhole allows you to redirect malicious domain queries:- Navigate to Objects > Security Profiles > Anti-Spyware
- Edit your Anti-Spyware profile
- Under DNS Signatures:
- Sinkhole: Enable
- IPv4 Address: Configure sinkhole IP (e.g., 72.5.65.111)
- IPv6 Address: Configure if using IPv6
- Ensure Log is enabled for DNS categories
Log Format and Field Mapping
SafeNetworking expects standard PAN-OS syslog format. The Logstash pipeline parses CSV-formatted logs based on PAN-OS field order.THREAT Log Format
The threat.conf pipeline parses THREAT logs with the following key fields:View Complete Field List
View Complete Field List
The complete field list includes 68+ fields as documented in the PAN-OS 9.0 Threat Log Fields reference.Key fields processed by SafeNetworking:
- ThreatID: Signature identifier
- ThreatCategory: dns, dns-cloud, dns-security, url, etc.
- URL_Filename: Contains domain name for DNS queries
- Category: Threat category
- Severity: Critical, High, Medium, Low, Informational
DNS Event Processing
SafeNetworking automatically categorizes DNS threats:Best Practices
Log Filtering
Log Filtering
Filter by Severity: Consider filtering logs to reduce volume:
- Production: Log Critical, High, Medium severity
- Testing: Log all severities including Informational
- Untrust to Trust (Internet to DMZ/Internal)
- DMZ to Trust
- Skip Trust to Trust for reduced volume
Performance Tuning
Performance Tuning
Syslog Rate Limiting: Configure appropriate rate limits:Selective Policy Logging: Enable logging only on policies that matter:
- Internet access policies
- External-facing services
- High-risk zones
High Availability
High Availability
Redundant Syslog Servers: Add backup server:
DNS Resolution
DNS Resolution
Avoid Recursion: The SafeNetworking host should NOT be behind a firewall that will generate threat logs for DNS resolution of malicious domains, as this creates recursive logging.The threat.conf pipeline includes commented-out DNS resolution options:
Verification
After configuration, verify logs are being received:Verify Elasticsearch
Check if indices are being created:You should see indices like:
threat-2026.03gtp-2026.03system-2026.03
Troubleshooting
No logs appearing in SafeNetworking
No logs appearing in SafeNetworking
Check network connectivity:Verify firewall logging:Check SafeNetworking firewall:
Logs received but not parsed
Logs received but not parsed
Check Logstash pipeline:Review failed events:Verify PAN-OS version compatibility: SafeNetworking v4.0 supports PAN-OS 8.x and 9.x field formats.
Missing DNS threat correlation
Missing DNS threat correlation
Verify ThreatCategory field: Should contain “dns”, “dns-cloud”, or “dns-security”Check Anti-Spyware profile: Ensure DNS Security is enabled and loggingReview SFN tags in Elasticsearch:
Next Steps
Kibana Dashboards
Explore pre-configured dashboards and visualizations
Operations Guide
Learn how to operate and manage SafeNetworking
