Traffic Log Fields
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
- Cloud Management of NGFWs
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0 (EoL)
- PAN-OS 11.1 & Later
- PAN-OS 9.1 (EoL)
-
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0 (EoL)
- PAN-OS 11.1 & Later
-
-
- Cloud Management and AIOps for NGFW
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0 (EoL)
- PAN-OS 11.1
- PAN-OS 11.2
- PAN-OS 8.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 9.1 (EoL)
End-of-Life (EoL)
Traffic Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type,
Threat/Content Type, FUTURE_USE, Generated Time, Source Address,
Destination Address, NAT Source IP, NAT Destination IP, Rule Name,
Source User, Destination User, Application, Virtual System, Source
Zone, Destination Zone, Inbound Interface, Outbound Interface, Log
Action, FUTURE_USE, Session ID, Repeat Count, Source Port, Destination
Port, NAT Source Port, NAT Destination Port, Flags, Protocol, Action,
Bytes, Bytes Sent, Bytes Received, Packets, Start Time, Elapsed Time,
Category, FUTURE_USE, Sequence Number, Action Flags, Source Location, Destination
Location, FUTURE_USE, Packets Sent, Packets Received, Session End Reason,
Device Group Hierarchy Level 1, Device Group Hierarchy
Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy
Level 4, Virtual System Name, Device Name, Action Source,
Source VM UUID, Destination VM UUID, Tunnel ID/IMSI, Monitor Tag/IMEI,
Parent Session ID, Parent Start Time, Tunnel Type, SCTP Association
ID, SCTP Chunks, SCTP Chunks Sent, SCTP Chunks Received, Rule UUID,
HTTP/2 Connection, App Flap Count, Policy ID, Link Switches, SD-WAN Cluster,
SD-WAN Device Type, SD-WAN Cluster Type, SD-WAN Site, Dynamic User Group
Name
Field Name | Description |
---|---|
Receive Time (receive_time or cef-formatted-receive_time) | Time the log was received at the management plane. |
Serial Number (serial) | Serial number of the firewall that generated
the log. |
Type (type) | Specifies the type of log; value is TRAFFIC. |
Threat/Content Type (subtype) | Subtype of traffic log; values are start,
end, drop, and deny
|
Generated Time (time_generated or cef-formatted-time_generated) | Time the log was generated on the dataplane. |
Source Address (src) | Original session source IP address. |
Destination Address (dst) | Original session destination IP address. |
NAT Source IP (natsrc) | If Source NAT performed, the post-NAT Source
IP address. |
NAT Destination IP (natdst) | If Destination NAT performed, the post-NAT
Destination IP address. |
Rule Name (rule) | Name of the rule that the session matched. |
Source User (srcuser) | Username of the user who initiated the session. |
Destination User (dstuser) | Username of the user to which the session
was destined. |
Application (app) | Application associated with the session. |
Virtual System (vsys) | Virtual System associated with the session. |
Source Zone (from) | Zone the session was sourced from. |
Destination Zone (to) | Zone the session was destined to. |
Inbound Interface (inbound_if) | Interface that the session was sourced from. |
Outbound Interface (outbound_if) | Interface that the session was destined
to. |
Log Action (logset) | Log Forwarding Profile that was applied
to the session. |
Session ID (sessionid) | An internal numerical identifier applied
to each session. |
Repeat Count (repeatcnt) | Number of sessions with same Source IP,
Destination IP, Application, and Subtype seen within 5 seconds. |
Source Port (sport) | Source port utilized by the session. |
Destination Port (dport) | Destination port utilized by the session. |
NAT Source Port (natsport) | Post-NAT source port. |
NAT Destination Port (natdport) | Post-NAT destination port. |
Flags (flags) | 32-bit field that provides details on session;
this field can be decoded by AND-ing the values with the logged
value:
|
IP Protocol (proto) | IP protocol associated with the session. |
Action (action) | Action taken for the session; possible values
are:
|
Bytes (bytes) | Number of total bytes (transmit and receive)
for the session. |
Bytes Sent (bytes_sent) | Number of bytes in the client-to-server
direction of the session. |
Bytes Received (bytes_received) | Number of bytes in the server-to-client
direction of the session. |
Packets (packets) | Number of total packets (transmit and receive)
for the session. |
Start Time (start) | Time of session start. |
Elapsed Time (elapsed) | Elapsed time of the session. |
Category (category) | URL category associated with the session
(if applicable). |
Sequence Number (seqno) | A 64-bit log entry identifier incremented
sequentially; each log type has a unique number space. |
Action Flags (actionflags) | A bit field indicating if the log was forwarded
to Panorama. |
Source Country (srcloc) | Source country or Internal region for private
addresses; maximum length is 32 bytes. |
Destination Country (dstloc) | Destination country or Internal region for
private addresses. Maximum length is 32 bytes. |
Packets Sent (pkts_sent) | Number of client-to-server packets for the
session. |
Packets Received (pkts_received) | Number of server-to-client packets for the
session. |
Session End Reason (session_end_reason) | The reason a session terminated. If the
termination had multiple causes, this field displays only the highest
priority reason. The possible session end reason values are as follows,
in order of priority (where the first is highest):
|
| |
Device Group Hierarchy (dg_hier_level_1
to dg_hier_level_4) | A sequence of identification numbers that
indicate the device group’s location within a device group hierarchy.
The firewall (or virtual system) generating the log includes the identification
number of each ancestor in its device group hierarchy. The shared
device group (level 0) is not included in this structure. If
the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45,
and its ancestors are 34, and 12. To view the device group names
that correspond to the value 12, 34 or 45, use one of the following
methods: API query:
|
Virtual System Name (vsys_name) | The name of the virtual system associated
with the session; only valid on firewalls enabled for multiple virtual systems. |
Device Name (device_name) | The hostname of the firewall on which the
session was logged. |
Action Source (action_source) | Specifies whether the action taken to allow
or block an application was defined in the application or in policy.
The actions can be allow, deny, drop, reset- server, reset-client
or reset-both for the session. |
Source VM UUID (src_uuid) | Identifies the source universal unique identifier
for a guest virtual machine in the VMware NSX environment. |
Destination VM UUID (dst_uuid) | Identifies the destination universal unique
identifier for a guest virtual machine in the VMware NSX environment. |
Tunnel ID/IMSI (tunnelid/imsi) | International Mobile Subscriber
Identity (IMSI) is a unique number allocated to each mobile subscriber
in the GSM/UMTS/EPS system. IMSI shall consist of decimal digits
(0 through 9) only and maximum number of digits allowed are 15. |
Monitor Tag/IMEI (monitortag/imei) | International Mobile Equipment
Identity (IMEI) is a unique 15 or 16 digit number allocated to each
mobile station equipment. |
Parent Session ID (parent_session_id) | ID of the session in which this session
is tunneled. Applies to inner tunnel (if two levels of tunneling)
or inside content (if one level of tunneling) only. |
Parent Start Time (parent_start_time) | Year/month/day hours:minutes:seconds that
the parent tunnel session began. |
Tunnel Type (tunnel) | Type of tunnel, such as GRE
or IPSec. |
SCTP Association ID (assoc_id) | Number that identifies all connections for
an association between two SCTP endpoints. |
SCTP Chunks (chunks) | Sum of SCTP chunks sent and received for
an association. |
SCTP Chunks Sent (chunks_sent) | Number of SCTP chunks sent for an association. |
SCTP Chunks Received (chunks_received) | Number of SCTP chunks received for an association. |
Rule UUID (rule_uuid) | The UUID that permanently identifies the
rule. |
HTTP/2 Connection | Identifies if traffic used an HTTP/2 Connection
by displaying one of the following values:
|
App Flap Count (link_change_count) | Number of link flaps that occurred during
the session. |
Policy ID (policy_id) | Name of the SD-WAN policy. |
Link Switches (link_switches) | Contains up to four link flap entries, with
each entry containing the link name, link tag, link type, physical
interface, timestamp, bytes read, bytes written, link health, and
link flap cause. |
SD-WAN Cluster (sdwan_cluster) | Name of the SD-WAN cluster. |
SD-WAN Device Type (sdwan_device_type) | Type of device (hub or branch). |
SD-WAN Cluster Type (sdwan_cluster_type) | Type of cluster (mesh or hub-spoke). |
SD-WAN Site (sdwan_site) | Name of the SD-WAN site. |
Dynamic User Group Name (dynusergroup_name) | Name of the dynamic user group that contains
the user who initiated the session. |