index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
591 | Monitoring
Field Name Description
App Flap Count
(link_change_count)
Number of link flaps that occurred during the session.
Policy ID (policy_id) Name of the SD-WAN policy.
Link Switches (link_switches) Contains up to four link flap entries, with each entry containing
the link name, link tag, link type, physical interface, timestamp,
bytes read, bytes written, link health, and link flap cause.
SD-WAN Cluster
(sdwan_cluster)
Name of the SD-WAN cluster.
SD-WAN Device Type
(sdwan_device_type)
Type of device (hub or branch).
SD-WAN Cluster Type
(sdwan_cluster_type)
Type of cluster (mesh or hub-spoke).
SD-WAN Site (sdwan_site) Name of the SD-WAN site.
Dynamic User Group Name
(dynusergroup_name)
Name of the dynamic user group that contains the user who
initiated the session.
XFF Address (xff_ip) The IP address of the user who requested the web page or
the IP address of the next to last device that the request
traversed. If the request goes through one or more proxies,
load balancers, or other upstream devices, the firewall displays
the IP address of the most recent device.
Based on different appliance implementations, the
XFF field may contain non-IP address values.
Source Device Category
(src_category)
The category for the device that Device-ID identifies as the
source of the traffic.
Source Device Profile
(src_profile)
The device profile for the device that Device-ID identifies as
the source of the traffic.
Source Device Model
(src_model)
The model of the device that Device-ID identifies as the
source of the traffic.
Source Device Vendor
(src_vendor)
The vendor of the device that Device-ID identifies as the
source of the traffic.
Source Device OS Family
(src_osfamily)
The operating system type for the device that Device-ID
identifies as the source of the traffic.
PAN-OS® Administrator’s Guide Version 10.2 592 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
592 | Monitoring
Field Name Description
Source Device OS Version
(src_osversion)
The version of the operating system for the device that
Device-ID identifies as the source of the traffic.
Source Hostname (src_host) The hostname of the device that Device-ID identifies as the
source of the traffic.
Source MAC Address
(src_mac)
The MAC address for the device that Device-ID identifies as
the source of the traffic.
Destination Device Category
(dst_category)
The category for the device that Device-ID identifies as the
destination for the traffic.
Destination Device Profile
(dst_profile)
The device profile for the device that Device-ID identifies as
the destination for the traffic.
Destination Device Model
(dst_model)
The model of the device that Device-ID identifies as the
destination for the traffic.
Destination Device Vendor
(dst_vendor)
The vendor of the device that Device-ID identifies as the
destination for the traffic.
Destination Device OS
Family (dst_osfamily)
The operating system type for the device that Device-ID
identifies as the destination for the traffic.
Destination Device OS
Version (dst_osversion)
The version of the operating system for the device that
Device-ID identifies as the destination for the traffic.
Destination Hostname
(dst_host)
The hostname of the device that Device-ID identifies as the
destination for the traffic.
Destination MAC Address
(dst_mac)
The MAC address for the device that Device-ID identifies as
the destination for the traffic.
Container ID (container_id) The container ID of the PAN-NGFW pod on the Kubernetes
node where the application POD is deployed.
POD Namespace
(pod_namespace)
The namespace of the application POD being secured.
POD Name (pod_name) The application POD being secured.
Source External Dynamic List
(src_edl)
The name of the external dynamic list that contains the source
IP address of the traffic.
Destination External
Dynamic List (dst_edl)
The name of the external dynamic list that contains the
destination IP address of the traffic.
PAN-OS® Administrator’s Guide Version 10.2 593 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
593 | Monitoring
Field Name Description
Host ID (hostid) Unique ID GlobalProtect assigns to identify the host.
User Device Serial Number
(serialnumber)
Serial number of the user’s machine or device.
Source Dynamic Address
Group (src_dag)
Original session source dynamic address group.
Destination Dynamic Address
Group (dst_dag)
Original destination source dynamic address group.
Session Owner
(session_owner)
The original high availability (HA) peer session owner in an HA
cluster from which the session table data was synchronized
upon HA failover.
High Resolution Timestamp
(high_res_timestamp)
Time in milliseconds the log was received at the management
plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
The High Resolution Timestamp is supported
for logs received from managed firewalls
running PAN-OS 10.0 and later releases.
Logs received from managed firewalls running
PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00
timestamp regardless of when the log was received.
A Slice Service Type
(nssai_sst)
The A Slice Service Type of the Network Slice ID.
A Slice Differentiator
(nssai_sd)
The A Slice Differentiator of the Network Slice ID.
PAN-OS® Administrator’s Guide Version 10.2 594 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
594 | Monitoring
Field Name Description
Application Subcategory
(subcategory_of_app)
The application subcategory specified in the application
configuration properties.
Application Category
(category_of_app)
The application category specified in the application
configuration properties. Values are:
• business-systems
• collaboration
• general-internet
• media
• networking
• saas
Application Technology
(technology_of_app)
The application technology specified in the application
configuration properties. Values are:
• browser-based
• client-server
• network-protocol
• peer-to-peer
Application Risk (risk_of_app) Risk level associated with the application (1=lowest to
5=highest).
Application Characteristic
(characteristic_of_app)
Comma-separated list of applicable characteristic of the
application
Application Container
(container_of_app)
The parent application for an application.
Tunneled Application
(tunneled_app)
Name of the tunneled application.
Application SaaS
(is_saas_of_app)
Displays 1 if a SaaS application or 0 if not a SaaS application.
Application Sanctioned State
(sanctioned_state_of_app)
Displays 1 if application is sanctioned or 0 if application is not
sanctioned.
Offloaded (offloaded) Displays 1 if traffic flow has been offloaded or 0 if traffic flow
was not offloaded.
PAN-OS® Administrator’s Guide Version 10.2 595 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
595 | Monitoring
Threat Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE,
Generated Time, Source Address, Destination Address, NAT Source IP, NAT Destination IP, Rule
Name, Source User, Destination User, Application, Virtual System, Source Zone, Destination Zone,
Inbound Interface, Outbound Interface, Log Action, FUTURE_USE, Session ID, Repeat Count,
Source Port, Destination Port, NAT Source Port, NAT Destination Port, Flags, IP Protocol, Action,
URL/Filename, Threat ID, Category, Severity, Direction, Sequence Number, Action Flags, Source
Location, Destination Location, FUTURE_USE, Content Type, PCAP_ID, File Digest, Cloud, URL
Index, User Agent, File Type, X-Forwarded-For, Referer, Sender, Subject, Recipient, Report ID,
Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level
3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, FUTURE_USE, Source
VM UUID, Destination VM UUID, HTTP Method, Tunnel ID/IMSI, Monitor Tag/IMEI, Parent
Session ID, Parent Start Time, Tunnel Type, Threat Category, Content Version, FUTURE_USE,
SCTP Association ID, Payload Protocol ID, HTTP Headers, URL Category List, Rule UUID, HTTP/2
Connection, Dynamic User Group Name, XFF Address, Source Device Category, Source Device
Profile, Source Device Model, Source Device Vendor, Source Device OS Family, Source Device
OS Version, Source Hostname, Source MAC Address, Destination Device Category, Destination
Device Profile, Destination Device Model, Destination Device Vendor, Destination Device OS
Family, Destination Device OS Version, Destination Hostname, Destination MAC Address,
Container ID, POD Namespace, POD Name, Source External Dynamic List, Destination External
Dynamic List, Host ID, Serial Number, Domain EDL, Source Dynamic Address Group, Destination
Dynamic Address Group, Partial Hash, High Resolution Timestamp, Reason, Justification, A Slice
Service Type, Application Subcategory, Application Category, Application Technology, Application
Risk, Application Characteristic, Application Container, Tunneled Application, Application SaaS,
Application Sanctioned State, Cloud Report ID
Field Name Description
Receive Time
(receive_time or cefformatted-receive_time)
Time the log was received at the management plane.
Serial Number (serial #) Serial number of the firewall that generated the log.
Type (type) Specifies the type of log; value is THREAT.
Threat/Content Type
(subtype)
Subtype of threat log. Values include the following:
• data—Data pattern matching a Data Filtering profile.
• file—File type matching a File Blocking profile.
• flood—Flood detected via a Zone Protection profile.
• packet—Packet-based attack protection triggered by a Zone
Protection profile.
• scan—Scan detected via a Zone Protection profile.
• spyware —Spyware detected via an Anti-Spyware profile.
• url—URL filtering log.
PAN-OS® Administrator’s Guide Version 10.2 596 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
596 | Monitoring
Field Name Description
• ml-virus—Virus detected by WildFire Inline ML via an Antivirus
profile.
• virus—Virus detected via an Antivirus profile.
• vulnerability —Vulnerability exploit detected via a Vulnerability
Protection profile.
• wildfire —A WildFire verdict generated when the firewall
submits a file to WildFire per a WildFire Analysis profile and a
verdict (malware, phishing, grayware, or benign, depending on
what you are logging) is logged in the WildFire Submissions log.
• wildfire-virus—Virus detected via an Antivirus profile.
Generate Time
(time_generated
or cef-formattedtime_generated)
Time the log was generated on the dataplane.
Source address (src) Original session source IP address.
Destination address (dst) Original session destination IP address.
NAT Source IP (natsrc) If source NAT performed, the post-NAT source IP address.
NAT Destination IP
(natdst)
If destination NAT performed, the post-NAT destination IP address.
Rule Name (rule) Name of the rule that the session matched.
Source User (srcuser) Username of the user who initiated the session.
Destination User
(dstuser)
Username of the user to which the session was destined.
Application (app) Application associated with the session.
Virtual System (vsys) Virtual System associated with the session.
Source Zone (from) Zone the session was sourced from.
Destination Zone (to) Zone the session was destined to.
Inbound Interface
(inbound_if)
Interface that the session was sourced from.
Outbound Interface
(outbound_if)
Interface that the session was destined to.
PAN-OS® Administrator’s Guide Version 10.2 597 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
597 | Monitoring
Field Name Description
Log Action (logset) Log Forwarding Profile that was applied to the session.
Session ID (sessionid) An internal numerical identifier applied to each session.
Repeat Count
(repeatcnt)
Number of sessions with same Source IP, Destination IP,
Application, and Content/Threat Type seen within 5 seconds.
Source Port (sport) Source port utilized by the session.
Destination Port (dport) Destination port utilized by the session.
NAT Source Port
(natsport)
Post-NAT source port.
NAT Destination Port
(natdport)
Post-NAT destination port.
Flags (flags) 32-bit field that provides details on session; this field can be
decoded by AND-ing the values with the logged value:
• 0x80000000—session has a packet capture (PCAP)
• 0x40000000—option is enabled to allow a client to use multiple
paths to connect to a destination host
• 0x20000000—file is submitted to WildFire for a verdict
• 0x10000000—enterprise credential submission by end user
detected
• 0x08000000— source for the flow is on an allow list and not
subject to recon protection
• 0x02000000—IPv6 session
• 0x01000000—SSL session is decrypted (SSL Proxy)
• 0x00800000—session is denied via URL filtering
• 0x00400000—session has a NAT translation performed
• 0x00200000—user information for the session was captured
through Authentication Portal
• 0x00100000—application traffic is on a non-standard destination
port
• 0x00080000 —X-Forwarded-For value from a proxy is in the
source user field
• 0x00040000 —log corresponds to a transaction within a http
proxy session (Proxy Transaction)
• 0x00020000—Client to Server flow is subject to policy based
forwarding
PAN-OS® Administrator’s Guide Version 10.2 598 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
598 | Monitoring
Field Name Description
• 0x00010000—Server to Client flow is subject to policy based
forwarding
• 0x00008000 —session is a container page access (Container
Page)
• 0x00002000 —session has a temporary match on a rule for
implicit application dependency handling. Available in PAN-OS
5.0.0 and above.
• 0x00000800 —symmetric return is used to forward traffic for
this session
• 0x00000400—decrypted traffic is being sent out clear text
through a mirror port
• 0x00000010—payload of the outer tunnel is being inspected
IP Protocol (proto) IP protocol associated with the session.
Action (action) Action taken for the session; values are alert, allow, deny, drop,
drop-all-packets, reset-client, reset-server, reset-both, block-url.
• alert—threat or URL detected but not blocked
• allow— flood detection alert
• deny—flood detection mechanism activated and deny traffic
based on configuration
• drop— threat detected and session remains, but drops all packets
• reset-client —threat detected and a TCP RST is sent to the client
• reset-server —threat detected and a TCP RST is sent to the
server
• reset-both —threat detected and a TCP RST is sent to both the
client and the server
• block-url —URL request was blocked because it matched a URL
category that was set to be blocked
• block-ip—threat detected and client IP is blocked
• random-drop—flood detected and packet was randomly dropped
• sinkhole—DNS sinkhole activated
• syncookie-sent—syncookie alert
• block-continue (URL subtype only)—a HTTP request is blocked
and redirected to a Continue page with a button for confirmation
to proceed
• continue (URL subtype only)—response to a block-continue URL
continue page indicating a block-continue request was allowed
to proceed
PAN-OS® Administrator’s Guide Version 10.2 599 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
599 | Monitoring
Field Name Description
• block-override (URL subtype only)—a HTTP request is blocked
and redirected to an Admin override page that requires a pass
code from the firewall administrator to continue
• override-lockout (URL subtype only)—too many failed admin
override pass code attempts from the source IP. IP is now
blocked from the block-override redirect page
• override (URL subtype only)—response to a block-override page
where a correct pass code is provided and the request is allowed
• block (Wildfire only)—file was blocked by the firewall and
uploaded to Wildfire
URL/Filename (misc) Field with variable length. A Filename has a maximum of 63
characters. A URL has a maximum of 1023 characters
The actual URI when the subtype is url
File name or file type when the subtype is file
File name when the subtype is virus
File name when the subtype is wildfire-virus
File name when the subtype is wildfire
URL or File name when the subtype is vulnerability if applicable
URL when Threat Category is domain-edl
Spoofed SNI domain when a host header mismatch is detected
(identified by a unique threat ID of 86467).
Threat/Content Name
(threatid)
Palo Alto Networks identifier for known and custom threats. It
is a description string followed by a 64-bit numerical identifier in
parentheses for some Subtypes:
• 8000 – 8099— scan detection
• 8500 – 8599— flood detection
• 9999— URL filtering log
• 10000 – 19999 —spyware phone home detection
• 20000 – 29999 —spyware download detection
• 30000 – 44999 —vulnerability exploit detection
• 52000 – 52999— filetype detection
• 60000 – 69999 —data filtering detection
If the Domain EDL field is populated, then this field is populated
with the same value.
PAN-OS® Administrator’s Guide Version 10.2 600 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
600 | Monitoring
Field Name Description
Threat ID ranges for virus detection, WildFire signature
feed, and DNS C2 signatures used in previous releases
have been replaced with permanent, globally unique IDs.
Refer to the Threat/Content Type (subtype) and Threat
Category (thr_category) field names to create updated
reports, filter threat logs, and ACC activity.
Category (category) For URL Subtype, it is the URL Category; For WildFire subtype, it is
the verdict on the file and is either ‘malware’, ‘phishing’, ‘grayware’,
or ‘benign’; For other subtypes, the value is ‘any’.
Severity (severity) Severity associated with the threat; values are informational, low,
medium, high, critical.
Direction (direction) Indicates the direction of the attack, client-to-server or server-toclient:
• 0—direction of the threat is client to server
• 1—direction of the threat is server to client
Sequence Number
(seqno)
A 64-bit log entry identifier incremented sequentially. Each log type
has a unique number space.
Action Flags
(actionflags)
A bit field indicating if the log was forwarded to Panorama.
Source Country (srcloc) Source country or Internal region for private addresses. Maximum
length is 32 bytes.
Destination Country
(dstloc)
Destination country or Internal region for private addresses.
Maximum length is 32 bytes.
Content Type
(contenttype)
Applicable only when Subtype is URL.
Content type of the HTTP response data. Maximum length 32
bytes.
PCAP ID (pcap_id) The packet capture (pcap) ID is a 64 bit unsigned integral denoting
an ID to correlate threat pcap files with extended pcaps taken as
a part of that flow. All threat logs will contain either a pcap_id of 0
(no associated pcap), or an ID referencing the extended pcap file.
File Digest (filedigest) Only for WildFire subtype; all other types do not use this field
The filedigest string shows the binary hash of the file sent to be
analyzed by the WildFire service.
PAN-OS® Administrator’s Guide Version 10.2 601 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
601 | Monitoring
Field Name Description
Cloud (cloud) Only for WildFire subtype; all other types do not use this field.
The cloud string displays the FQDN of either the WildFire appliance
(private) or the WildFire cloud (public) from where the file was
uploaded for analysis.
URL Index (url_idx) Used in URL Filtering and WildFire subtypes.
When an application uses TCP keepalives to keep a connection
open for a length of time, all the log entries for that session have a
single session ID. In such cases, when you have a single threat log
(and session ID) that includes multiple URL entries, the url_idx is
a counter that allows you to correlate the order of each log entry
within the single session.
For example, to learn the URL of a file that the firewall forwarded
to WildFire for analysis, locate the session ID and the url_idx from
the WildFire Submissions log and search for the same session ID
and url_idx in your URL filtering logs. The log entry that matches
the session ID and url_idx will contain the URL of the file that was
forwarded to WildFire.
User Agent (user_agent) Only for the URL Filtering subtype; all other types do not use this
field.
The User Agent field specifies the web browser that the user used
to access the URL, for example Internet Explorer. This information
is sent in the HTTP request to the server.
File Type (filetype) Only for WildFire subtype; all other types do not use this field.
Specifies the type of file that the firewall forwarded for WildFire
analysis.
X-Forwarded-For (xff) Only for the URL Filtering subtype; all other types do not use this
field.
The X-Forwarded-For field in the HTTP header contains the IP
address of the user who requested the web page. It allows you to
identify the IP address of the user, which is useful particularly if
you have a proxy server on your network that replaces the user IP
address with its own address in the source IP address field of the
packet header.
Based on different appliance implementations, the XFF
field may contain non-IP address values.
Referer (referer) Only for the URL Filtering subtype; all other types do not use this
field.
PAN-OS® Administrator’s Guide Version 10.2 602 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
602 | Monitoring
Field Name Description
The Referer field in the HTTP header contains the URL of the web
page that linked the user to another web page; it is the source
that redirected (referred) the user to the web page that is being
requested.
Sender (sender) Specifies the name of the sender of an email.
Subject (subject) Specifies the subject of an email.
Recipient (recipient) Specifies the name of the receiver of an email.
Report ID (reportid) Only for Data Filtering and WildFire subtype; all other types do not
use this field.
Identifies the analysis request on the firewall, WildFire cloud, or the
WildFire appliance.
Device Group Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicate the device
group’s location within a device group hierarchy. The firewall (or
virtual system) generating the log includes the identification number
of each ancestor in its device group hierarchy. The shared device
group (level 0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was
generated by a firewall (or virtual system) that belongs to device
group 45, and its ancestors are 34, and 12. To view the device
group names that correspond to the value 12, 34 or 45, use one of
the following methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dghierarchy></show>
Virtual System Name
(vsys_name)
The name of the virtual system associated with the session; only
valid on firewalls enabled for multiple virtual systems.
Device Name
(device_name)
The hostname of the firewall on which the session was logged.
Source VM UUID
(src_uuid)
Identifies the source universal unique identifier for a guest virtual
machine in the VMware NSX environment.
Destination VM UUID
(dst_uuid)
Identifies the destination universal unique identifier for a guest
virtual machine in the VMware NSX environment.
PAN-OS® Administrator’s Guide Version 10.2 603 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
603 | Monitoring
Field Name Description
HTTP Method
(http_method)
Only in URL filtering logs. Describes the HTTP Method used in the
web request. Only the following methods are logged: Connect,
Delete, Get, Head, Options, Post, Put.
Tunnel ID/IMSI
(tunnel_id/imsi)
International Mobile Subscriber Identity (IMSI) is a unique number
allocated to each mobile subscriber in the GSM/UMTS/EPS system.
IMSI shall consist of decimal digits (0 through 9) only and maximum
number of digits allowed are 15.
Monitor Tag/IMEI
(monitortag/imei)
International Mobile Equipment Identity (IMEI) is a unique 15 or 16
digit number allocated to each mobile station equipment.
Parent Session ID
(parent_session_id)
ID of the session in which this session is tunneled. Applies to inner
tunnel (if two levels of tunneling) or inside content (if one level of
tunneling) only.
Parent Session Start
Time (parent_start_time)
Year/month/day hours:minutes:seconds that the parent tunnel
session began.
Tunnel Type (tunnel) Type of tunnel, such as GRE or IPSec.
Threat Category
(thr_category)
Describes threat categories used to classify different types of threat
signatures.
If a domain external dynamic list generated the log, domain-edl
populates this field.
Content Version
(contentver)
Applications and Threats version on your firewall when the log was
generated.
SCTP Association ID
(assoc_id)
Number that identifies all connections for an association between
two SCTP endpoints.
Payload Protocol ID
(ppid)
ID of the protocol for the payload in the data portion of the data
chunk.
HTTP Headers
(http_headers)
Indicates the inserted HTTP header in the URL log entries on the
firewall.
URL Category List
(url_category_list)
Lists the URL filtering categories that the firewall used to enforce
policy.
Rule UUID (rule_uuid) The UUID that permanently identifies the rule.
HTTP/2 Connection
(http2_connection)
Identifies if traffic used an HTTP/2 connection by displaying one of
the following values:
• TCP connection session ID—session is HTTP/2
PAN-OS® Administrator’s Guide Version 10.2 604 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
604 | Monitoring
Field Name Description
• 0—session is not HTTP/2
Dynamic User
Group Name
(dynusergroup_name)
The name of the dynamic user group that contains the user who
initiated the session.
XFF Address (xff_ip) The IP address of the user who requested the web page or the IP
address of the next to last device that the request traversed. If the
request goes through one or more proxies, load balancers, or other
upstream devices, the firewall displays the IP address of the most
recent device.
Based on different appliance implementations, the XFF
field may contain non-IP address values.
Source Device Category
(src_category)
The category for the device that Device-ID identifies as the source
of the traffic.
Source Device Profile
(src_profile)
The device profile for the device that Device-ID identifies as the
source of the traffic.
Source Device Model
(src_model)
The model of the device that Device-ID identifies as the source of
the traffic.
Source Device Vendor
(src_vendor)
The vendor of the device that Device-ID identifies as the source of
the traffic.
Source Device OS
Family (src_osfamily)
The operating system type for the device that Device-ID identifies
as the source of the traffic.
Source Device OS
Version (src_osversion)
The version of the operating system for the device that Device-ID
identifies as the source of the traffic.
Source Hostname
(src_host)
The hostname of the device that Device-ID identifies as the source
of the traffic.
Source MAC Address
(src_mac)
The MAC address for the device that Device-ID identifies as the
source of the traffic.
Destination Device
Category (dst_category)
The category for the device that Device-ID identifies as the
destination for the traffic.
Destination Device
Profile (dst_profile)
The device profile for the device that Device-ID identifies as the
destination for the traffic.
PAN-OS® Administrator’s Guide Version 10.2 605 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
605 | Monitoring
Field Name Description
Destination Device
Model (dst_model)
The model of the device that Device-ID identifies as the destination
for the traffic.
Destination Device
Vendor (dst_vendor)
The vendor of the device that Device-ID identifies as the
destination for the traffic.
Destination Device OS
Family (dst_osfamily)
The operating system type for the device that Device-ID identifies
as the destination for the traffic.
Destination Device OS
Version (dst_osversion)
The version of the operating system for the device that Device-ID
identifies as the destination for the traffic.
Destination Hostname
(dst_host)
The hostname of the device that Device-ID identifies as the
destination for the traffic.
Destination MAC
Address (dst_mac)
The MAC address for the device that Device-ID identifies as the
destination for the traffic.
Container ID
(container_id)
The container ID of the PAN-NGFW pod on the Kubernetes node
where the application POD is deployed.
POD Namespace
(pod_namespace)
The namespace of the application POD being secured.
POD Name (pod_name) The application POD being secured.
Source External
Dynamic List (src_edl)
The name of the external dynamic list that contains the source IP
address of the traffic.
Destination External
Dynamic List (dst_edl)
The name of the external dynamic list that contains the destination
IP address of the traffic.
Host ID (hostid) Unique ID GlobalProtect assigns to identify the host.
User Device Serial
Number (serialnumber)
Serial number of the user’s machine or device.
Domain EDL
(domain_edl)
The name of the external dynamic list that contains the domain
name of the traffic.
Source Dynamic
Address Group (src_dag)
Original session source dynamic address group.
Destination Dynamic
Address Group (dst_dag)
Original destination source dynamic address group.
PAN-OS® Administrator’s Guide Version 10.2 606 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
606 | Monitoring
Field Name Description
Partial Hash
(partial_hash)
Machine Learning partial hash.
High Resolution
Timestamp (high_res
timestamp)
Time in milliseconds the log was received at the management plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
The High Resolution Timestamp is supported for logs
received from managed firewalls running PAN-OS 10.2
and later releases. Logs received from managed firewalls
running PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00 timestamp
regardless of when the log was received.
Reason (reason) Reason for Data Filtering action.
Justification
(justification)
Justification for Data Filtering action.
A Slice Service Type
(nssai_sst)
The A Slice Service Type of the Network Slice ID.
Application Subcategory
(subcategory_of_app)
The application subcategory specified in the application
configuration properties.
Application Category
(category_of_app)
The application category specified in the application configuration
properties. Values are:
• business-systems
• collaboration
• general-internet
• media
• networking
PAN-OS® Administrator’s Guide Version 10.2 607 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
607 | Monitoring
Field Name Description
• saas
Application Technology
(technology_of_app)
The application technology specified in the application
configuration properties. Values are:
• browser-based
• client-server
• network-protocol
• peer-to-peer
Application Risk
(risk_of_app)
Risk level associated with the application (1=lowest to 5=highest).
Application
Characteristic
(characteristic_of_app)
Comma-separated list of applicable characteristic of the application
Application Container
(container_of_app)
The parent application for an application.
Tunneled Application
(tunneled_app)
Name of the tunneled application.
Application SaaS
(is_saas_of_app)
Displays 1 if a SaaS application or 0 if not a SaaS application.
Application
Sanctioned State
(sanctioned_state_of_app)
Displays 1 if application is sanctioned or 0 if application is not
sanctioned.
Cloud Report ID
(cloud_reportid)
(PAN-OS 10.2.0) Unique 32 character ID for a file scanned by the
DLP cloud service sent by a firewall.
(PAN-OS 10.2.1 and later releases) Unique 67 character ID for a file
scanned by the DLP cloud service sent by a firewall.
The same Cloud Report ID is displayed for a file the DLP cloud
service has already scanned and generated a Cloud Report ID for.
URL Filtering Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE,
Generated Time, Source Address, Destination Address, NAT Source IP, NAT Destination IP, Rule
Name, Source User, Destination User, Application, Virtual System, Source Zone, Destination Zone,
Inbound Interface, Outbound Interface, Log Action, FUTURE_USE, Session ID, Repeat Count,
Source Port, Destination Port, NAT Source Port, NAT Destination Port, Flags, IP Protocol, Action,
URL/Filename, Threat ID, Category, Severity, Direction, Sequence Number, Action Flags, Source
Country, Destination Country, FUTURE_USE, Content Type, PCAP_ID, File Digest, Cloud, URL
PAN-OS® Administrator’s Guide Version 10.2 608 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
608 | Monitoring
Index, User Agent, File Type, X-Forwarded-For, Referer, Sender, Subject, Recipient, Report ID,
Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level
3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, FUTURE_USE, Source
VM UUID, Destination VM UUID, HTTP Method, Tunnel ID/IMSI, Monitor Tag/IMEI, Parent
Session ID, Parent Start Time, Tunnel Type, Threat Category, Content Version, FUTURE_USE,
SCTP Association ID, Payload Protocol ID, HTTP Headers, URL Category List, Rule UUID, HTTP/2
Connection, Dynamic User Group Name, XFF Address, Source Device Category, Source Device
Profile, Source Device Model, Source Device Vendor, Source Device OS Family, Source Device
OS Version, Source Hostname, Source MAC Address, Destination Device Category, Destination
Device Profile, Destination Device Model, Destination Device Vendor, Destination Device OS
Family, Destination Device OS Version, Destination Hostname, Destination MAC Address,
Container ID, POD Namespace, POD Name, Source External Dynamic List, Destination External
Dynamic List, Host ID, Serial Number, Domain EDL, Source Dynamic Address Group, Destination
Dynamic Address Group, Partial Hash, High Resolution Timestamp, Reason, Justification, A Slice
Service Type, Application Subcategory, Application Category, Application Technology, Application
Risk, Application Characteristic, Application Container, Tunneled Application, Application SaaS,
Application Sanctioned State, Cloud Report ID
Field Name Description
Receive Time
(receive_time or cefformatted-receive_time)
Time the log was received at the management plane.
Serial Number (serial #) Serial number of the firewall that generated the log.
Type (type) Specifies the type of log; value is THREAT.
Threat/Content Type
(subtype)
Subtype of threat log; value is url.
Generate Time
(time_generated
or cef-formattedtime_generated)
Time the log was generated on the dataplane.
Source address (src) Original session source IP address.
Destination address (dst) Original session destination IP address.
NAT Source IP (natsrc) If source NAT performed, the post-NAT source IP address.
NAT Destination IP
(natdst)
If destination NAT performed, the post-NAT destination IP address.
Rule Name (rule) Name of the rule that the session matched.
Source User (srcuser) Username of the user who initiated the session.
PAN-OS® Administrator’s Guide Version 10.2 609 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
609 | Monitoring
Field Name Description
Destination User
(dstuser)
Username of the user to which the session was destined.
Application (app) Application associated with the session.
Virtual System (vsys) Virtual System associated with the session.
Source Zone (from) Zone the session was sourced from.
Destination Zone (to) Zone the session was destined to.
Inbound Interface
(inbound_if)
Interface that the session was sourced from.
Outbound Interface
(outbound_if)
Interface that the session was destined to.
Log Action (logset) Log Forwarding Profile that was applied to the session.
Session ID (sessionid) An internal numerical identifier applied to each session.
Repeat Count
(repeatcnt)
Number of sessions with same Source IP, Destination IP,
Application, and Content/Threat Type seen within 5 seconds.
Source Port (sport) Source port utilized by the session.
Destination Port (dport) Destination port utilized by the session.
NAT Source Port
(natsport)
Post-NAT source port.
NAT Destination Port
(natdport)
Post-NAT destination port.
Flags (flags) 32-bit field that provides details on session; this field can be
decoded by AND-ing the values with the logged value:
• 0x80000000—session has a packet capture (PCAP)
• 0x40000000—option is enabled to allow a client to use multiple
paths to connect to a destination host
• 0x20000000—file is submitted to WildFire for a verdict
• 0x10000000—enterprise credential submission by end user
detected
• 0x08000000— source for the flow is on an allow list and not
subject to recon protection
PAN-OS® Administrator’s Guide Version 10.2 610 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
610 | Monitoring
Field Name Description
• 0x02000000—IPv6 session
• 0x01000000—SSL session is decrypted (SSL Proxy)
• 0x00800000—session is denied via URL filtering
• 0x00400000—session has a NAT translation performed
• 0x00200000—user information for the session was captured
through Authentication Portal
• 0x00100000—application traffic is on a non-standard destination
port
• 0x00080000 —X-Forwarded-For value from a proxy is in the
source user field
• 0x00040000 —log corresponds to a transaction within a http
proxy session (Proxy Transaction)
• 0x00020000—Client to Server flow is subject to policy based
forwarding
• 0x00010000—Server to Client flow is subject to policy based
forwarding
• 0x00008000 —session is a container page access (Container
Page)
• 0x00002000 —session has a temporary match on a rule for
implicit application dependency handling. Available in PAN-OS
5.0.0 and above.
• 0x00000800 —symmetric return is used to forward traffic for
this session
• 0x00000400—decrypted traffic is being sent out clear text
through a mirror port
• 0x00000010—payload of the outer tunnel is being inspected
IP Protocol (proto) IP protocol associated with the session.
Action (action) Action taken for the session; values are alert, allow, block-url, blockcontinue, continue, block-override, override-lockout, override.
• alert—threat or URL detected but not blocked
• block-url —URL request was blocked because it matched a URL
category that was set to be blocked
• block-continue—a HTTP request is blocked and redirected to a
Continue page with a button for confirmation to proceed
• continue —response to a block-continue URL continue page
indicating a block-continue request was allowed to proceed
PAN-OS® Administrator’s Guide Version 10.2 611 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
611 | Monitoring
Field Name Description
• block-override —a HTTP request is blocked and redirected to an
Admin override page that requires a pass code from the firewall
administrator to continue
• override-lockout—too many failed admin override pass code
attempts from the source IP. IP is now blocked from the blockoverride redirect page
• override —response to a block-override page where a correct
pass code is provided and the request is allowed
URL/Filename (misc) Field with variable length. A URL has a maximum of 1023
characters.
The actual URI when the subtype is url.
URL when Threat Category is domain-edl.
Threat/Content Name
(threatid)
Palo Alto Networks identifier for known and custom threats. It
is a description string followed by a 64-bit numerical identifier in
parentheses for some Subtypes:
• 8000 – 8099— scan detection
• 8500 – 8599— flood detection
• 9999— URL filtering log
• 10000 – 19999 —spyware phone home detection
• 20000 – 29999 —spyware download detection
• 30000 – 44999 —vulnerability exploit detection
• 52000 – 52999— filetype detection
• 60000 – 69999 —data filtering detection
If the domain EDL field is populated, then this field is populated
with the same value.
Threat ID ranges for virus detection, WildFire signature
feed, and DNS C2 signatures used in previous releases
have been replaced with permanent, globally unique
IDs. Refer to the Threat/Content Type (subtype) and
Threat Category (thr_category) field names to create
updated reports, filter threat logs, and ACC activity.
Category (category) For URL Subtype, it is the URL Category; For WildFire subtype, it is
the verdict on the file and is either ‘malware’, ‘phishing’, ‘grayware’,
or ‘benign’; For other subtypes, the value is ‘any’.
Severity (severity) Severity associated with the threat; values are informational, low,
medium, high, critical.
PAN-OS® Administrator’s Guide Version 10.2 612 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
612 | Monitoring
Field Name Description
Direction (direction) Indicates the direction of the attack:
• client-to-server
• server-to-client
Sequence Number
(seqno)
A 64-bit log entry identifier incremented sequentially. Each log type
has a unique number space.
Action Flags
(actionflags)
A bit field indicating if the log was forwarded to Panorama.
Source Country (srcloc) Source country or Internal region for private addresses. Maximum
length is 32 bytes.
Destination Country
(dstloc)
Destination country or Internal region for private addresses.
Maximum length is 32 bytes.
Content Type
(contenttype)
Content type of the HTTP response data. Maximum length 32
bytes.
PCAP ID (pcap_id) The packet capture (pcap) ID is a 64 bit unsigned integral denoting
an ID to correlate threat pcap files with extended pcaps taken as
a part of that flow. All threat logs will contain either a pcap_id of 0
(no associated pcap), or an ID referencing the extended pcap file.
File Digest (filedigest) Only for WildFire subtype; all other types do not use this field
The filedigest string shows the binary hash of the file sent to be
analyzed by the WildFire service.
Cloud (cloud) Only for WildFire subtype; all other types do not use this field.
The cloud string displays the FQDN of either the WildFire appliance
(private) or the WildFire cloud (public) from where the file was
uploaded for analysis.
URL Index (url_idx) When an application uses TCP keepalives to keep a connection
open for a length of time, all the log entries for that session have a
single session ID. In such cases, when you have a single threat log
(and session ID) that includes multiple URL entries, the url_idx is
a counter that allows you to correlate the order of each log entry
within the single session.
For example, to learn the URL of a file that the firewall forwarded
to WildFire for analysis, locate the session ID and the url_idx from
the WildFire Submissions log and search for the same session ID
and url_idx in your URL filtering logs. The log entry that matches
PAN-OS® Administrator’s Guide Version 10.2 613 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
613 | Monitoring
Field Name Description
the session ID and url_idx will contain the URL of the file that was
forwarded to WildFire.
User Agent (user_agent) The User Agent field specifies the web browser that the user used
to access the URL, for example Internet Explorer. This information
is sent in the HTTP request to the server.
File Type (filetype) Only for WildFire subtype; all other types do not use this field.
Specifies the type of file that the firewall forwarded for WildFire
analysis.
X-Forwarded-For (xff) The X-Forwarded-For field in the HTTP header contains the IP
address of the user who requested the web page. It allows you to
identify the IP address of the user, which is useful particularly if
you have a proxy server on your network that replaces the user IP
address with its own address in the source IP address field of the
packet header.
Based on different appliance implementations, the XFF
field may contain non-IP address values.
Referer (referer) The Referer field in the HTTP header contains the URL of the web
page that linked the user to another web page; it is the source
that redirected (referred) the user to the web page that is being
requested.
Sender (sender) Specifies the name of the sender of an email.
Subject (subject) Specifies the subject of an email.
Recipient (recipient) Specifies the name of the receiver of an email.
Report ID (reportid) Only for Data Filtering and WildFire subtype; all other types do not
use this field.
Identifies the analysis request on the firewall, WildFire cloud, or the
WildFire appliance.
Device Group Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicate the device
group’s location within a device group hierarchy. The firewall (or
virtual system) generating the log includes the identification number
of each ancestor in its device group hierarchy. The shared device
group (level 0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was
generated by a firewall (or virtual system) that belongs to device
group 45, and its ancestors are 34, and 12. To view the device
PAN-OS® Administrator’s Guide Version 10.2 614 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
614 | Monitoring
Field Name Description
group names that correspond to the value 12, 34 or 45, use one of
the following methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dghierarchy></show>
Virtual System Name
(vsys_name)
The name of the virtual system associated with the session; only
valid on firewalls enabled for multiple virtual systems.
Device Name
(device_name)
The hostname of the firewall on which the session was logged.
Source VM UUID
(src_uuid)
Identifies the source universal unique identifier for a guest virtual
machine in the VMware NSX environment.
Destination VM UUID
(dst_uuid)
Identifies the destination universal unique identifier for a guest
virtual machine in the VMware NSX environment.
HTTP Method
(http_method)
Describes the HTTP Method used in the web request. Only the
following methods are logged: Connect, Delete, Get, Head, Options,
Post, Put.
Tunnel ID/IMSI
(tunnel_id/imsi)
International Mobile Subscriber Identity (IMSI) is a unique number
allocated to each mobile subscriber in the GSM/UMTS/EPS system.
IMSI shall consist of decimal digits (0 through 9) only and maximum
number of digits allowed are 15.
Monitor Tag/IMEI
(monitortag/imei)
International Mobile Equipment Identity (IMEI) is a unique 15 or 16
digit number allocated to each mobile station equipment.
Parent Session ID
(parent_session_id)
ID of the session in which this session is tunneled. Applies to inner
tunnel (if two levels of tunneling) or inside content (if one level of
tunneling) only.
Parent Session Start
Time (parent_start_time)
Year/month/day hours:minutes:seconds that the parent tunnel
session began.
Tunnel Type (tunnel) Type of tunnel, such as GRE or IPSec.
Threat Category
(thr_category)
Describes threat categories used to classify different types of threat
signatures.
If a domain external dynamic list generated the log, domain-edl
populates this field.
PAN-OS® Administrator’s Guide Version 10.2 615 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
615 | Monitoring
Field Name Description
Content Version
(contentver)
Applications and Threats version on your firewall when the log was
generated.
SCTP Association ID
(assoc_id)
Number that identifies all connections for an association between
two SCTP endpoints.
Payload Protocol ID
(ppid)
ID of the protocol for the payload in the data portion of the
data chunk.
HTTP Headers
(http_headers)
Indicates the inserted HTTP header in the URL log entries on the
firewall.
URL Category List
(url_category_list)
Lists the URL filtering categories that the firewall used to enforce
policy.
Rule UUID (rule_uuid) The UUID that permanently identifies the rule.
HTTP/2 Connection
(http2_connection)
Identifies if traffic used an HTTP/2 connection by displaying one of
the following values:
• TCP connection session ID—session is HTTP/2
• 0—session is not HTTP/2
Dynamic User
Group Name
(dynusergroup_name)
The name of the dynamic user group that contains the user who
initiated the session.
XFF Address (xff_ip) The IP address of the user who requested the web page or the IP
address of the next to last device that the request traversed. If the
request goes through one or more proxies, load balancers, or other
upstream devices, the firewall displays the IP address of the most
recent device.
Based on different appliance implementations, the XFF
field may contain non-IP address values.
Source Device Category
(src_category)
The category for the device that Device-ID identifies as the source
of the traffic.
Source Device Profile
(src_profile)
The device profile for the device that Device-ID identifies as the
source of the traffic.
Source Device Model
(src_model)
The model of the device that Device-ID identifies as the source of
the traffic.
PAN-OS® Administrator’s Guide Version 10.2 616 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
616 | Monitoring
Field Name Description
Source Device Vendor
(src_vendor)
The vendor of the device that Device-ID identifies as the source of
the traffic.
Source Device OS
Family (src_osfamily)
The operating system type for the device that Device-ID identifies
as the source of the traffic.
Source Device OS
Version (src_osversion)
The version of the operating system for the device that Device-ID
identifies as the source of the traffic.
Source Hostname
(src_host)
The hostname of the device that Device-ID identifies as the source
of the traffic.
Source MAC Address
(src_mac)
The MAC address for the device that Device-ID identifies as the
source of the traffic.
Destination Device
Category (dst_category)
The category for the device that Device-ID identifies as the
destination for the traffic.
Destination Device
Profile (dst_profile)
The device profile for the device that Device-ID identifies as the
destination for the traffic.
Destination Device
Model (dst_model)
The model of the device that Device-ID identifies as the destination
for the traffic.
Destination Device
Vendor (dst_vendor)
The vendor of the device that Device-ID identifies as the
destination for the traffic.
Destination Device OS
Family (dst_osfamily)
The operating system type for the device that Device-ID identifies
as the destination for the traffic.
Destination Device OS
Version (dst_osversion)
The version of the operating system for the device that Device-ID
identifies as the destination for the traffic.
Destination Hostname
(dst_host)
The hostname of the device that Device-ID identifies as the
destination for the traffic.
Destination MAC
Address (dst_mac)
The MAC address for the device that Device-ID identifies as the
destination for the traffic.
Container ID
(container_id)
The container ID of the PAN-NGFW pod on the Kubernetes node
where the application POD is deployed.
POD Namespace
(pod_namespace)
The namespace of the application POD being secured.
POD Name (pod_name) The application POD being secured.
PAN-OS® Administrator’s Guide Version 10.2 617 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
617 | Monitoring
Field Name Description
Source External
Dynamic List (src_edl)
The name of the external dynamic list that contains the source IP
address of the traffic.
Destination External
Dynamic List (dst_edl)
The name of the external dynamic list that contains the destination
IP address of the traffic.
Host ID (hostid) Unique ID GlobalProtect assigns to identify the host.
User Device Serial
Number (serialnumber)
Serial number of the user’s machine or device.
Domain EDL
(domain_edl)
The name of the external dynamic list that contains the domain
name of the traffic.
Source Dynamic
Address Group (src_dag)
Original session source dynamic address group.
Destination Dynamic
Address Group (dst_dag)
Original destination source dynamic address group.
Partial Hash
(partial_hash)
Machine Learning partial hash.
High Resolution
Timestamp (high_res
timestamp)
Time in milliseconds the log was received at the management plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
The High Resolution Timestamp is supported for logs
received from managed firewalls running PAN-OS 10.1
and later releases. Logs received from managed firewalls
running PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00 timestamp
regardless of when the log was received.
PAN-OS® Administrator’s Guide Version 10.2 618 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
618 | Monitoring
Field Name Description
Reason (reason) Reason for URL Filtering action.
Justification
(justification)
Justification for URL Filtering action.
A Slice Service Type
(nssai_sst)
The A Slice Service Type of the Network Slice ID.
Application Subcategory
(subcategory_of_app)
The application subcategory specified in the application
configuration properties.
Application Category
(category_of_app)
The application category specified in the application configuration
properties. Values are:
• business-systems
• collaboration
• general-internet
• media
• networking
• saas
Application Technology
(technology_of_app)
The application technology specified in the application
configuration properties. Values are:
• browser-based
• client-server
• network-protocol
• peer-to-peer
Application Risk
(risk_of_app)
Risk level associated with the application (1=lowest to 5=highest).
Application
Characteristic
(characteristic_of_app)
Comma-separated list of applicable characteristic of the application
Application Container
(container_of_app)
The parent application for an application.
Tunneled Application
(tunneled_app)
Name of the tunneled application.
Application SaaS
(is_saas_of_app)
Displays yes if a SaaS application or no if not a SaaS application.
PAN-OS® Administrator’s Guide Version 10.2 619 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
619 | Monitoring
Field Name Description
Application
Sanctioned State
(sanctioned_state_of_app)
Displays yes if application is sanctioned or no if application is not
sanctioned.
Cloud Report ID
(cloud_reportid)
(PAN-OS 10.2.0) Unique 32 character ID for a file scanned by the
DLP cloud service sent by a firewall.
(PAN-OS 10.2.1 and later releases) Unique 67 character ID for a file
scanned by the DLP cloud service sent by a firewall.
The same Cloud Report ID is displayed for a file the DLP cloud
service has already scanned and generated a Cloud Report ID for.
Data Filtering Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE,
Generated Time, Source Address, Destination Address, NAT Source IP, NAT Destination IP, Rule
Name, Source User, Destination User, Application, Virtual System, Source Zone, Destination Zone,
Inbound Interface, Outbound Interface, Log Action, FUTURE_USE, Session ID, Repeat Count,
Source Port, Destination Port, NAT Source Port, NAT Destination Port, Flags, IP Protocol, Action,
URL/Filename, Threat ID, Category, Severity, Direction, Sequence Number, Action Flags, Source
Country, Destination Country, FUTURE_USE, Content Type, PCAP_ID, File Digest, Cloud, URL
Index, User Agent, File Type, X-Forwarded-For, Referer, Sender, Subject, Recipient, Report ID,
Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level
3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, FUTURE_USE, Source
VM UUID, Destination VM UUID, HTTP Method, Tunnel ID/IMSI, Monitor Tag/IMEI, Parent
Session ID, Parent Start Time, Tunnel Type, Threat Category, Content Version, FUTURE_USE,
SCTP Association ID, Payload Protocol ID, HTTP Headers, URL Category List, Rule UUID, HTTP/2
Connection, Dynamic User Group Name, XFF Address, Source Device Category, Source Device
Profile, Source Device Model, Source Device Vendor, Source Device OS Family, Source Device
OS Version, Source Hostname, Source MAC Address, Destination Device Category, Destination
Device Profile, Destination Device Model, Destination Device Vendor, Destination Device OS
Family, Destination Device OS Version, Destination Hostname, Destination MAC Address,
Container ID, POD Namespace, POD Name, Source External Dynamic List, Destination External
Dynamic List, Host ID, Serial Number, Domain EDL, Source Dynamic Address Group, Destination
Dynamic Address Group, Partial Hash, High Resolution Timestamp, Reason, Justification, A Slice
Service Type, Application Subcategory, Application Category, Application Technology, Application
Risk, Application Characteristic, Application Container, Tunneled Application, Application SaaS,
Application Sanctioned State, Cloud Report ID
Field Name Description
Receive Time
(receive_time or cefformatted-receive_time)
Time the log was received at the management plane.
Serial Number (serial #) Serial number of the firewall that generated the log.
PAN-OS® Administrator’s Guide Version 10.2 620 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
620 | Monitoring
Field Name Description
Type (type) Specifies the type of log; value is THREAT.
Threat/Content Type
(subtype)
Subtype of threat log; value is data, dlp, dlp-non-file, file.
Generate Time
(time_generated
or cef-formattedtime_generated)
Time the log was generated on the dataplane.
Source address (src) Original session source IP address.
Destination address (dst) Original session destination IP address.
NAT Source IP (natsrc) If source NAT performed, the post-NAT source IP address.
NAT Destination IP
(natdst)
If destination NAT performed, the post-NAT destination IP address.
Rule Name (rule) Name of the rule that the session matched.
Source User (srcuser) Username of the user who initiated the session.
Destination User
(dstuser)
Username of the user to which the session was destined.
Application (app) Application associated with the session.
Virtual System (vsys) Virtual System associated with the session.
Source Zone (from) Zone the session was sourced from.
Destination Zone (to) Zone the session was destined to.
Inbound Interface
(inbound_if)
Interface that the session was sourced from.
Outbound Interface
(outbound_if)
Interface that the session was destined to.
Log Action (logset) Log Forwarding Profile that was applied to the session.
Session ID (sessionid) An internal numerical identifier applied to each session.
Repeat Count
(repeatcnt)
Number of sessions with same Source IP, Destination IP,
Application, and Content/Threat Type seen within 5 seconds.
PAN-OS® Administrator’s Guide Version 10.2 621 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
621 | Monitoring
Field Name Description
Source Port (sport) Source port utilized by the session.
Destination Port (dport) Destination port utilized by the session.
NAT Source Port
(natsport)
Post-NAT source port.
NAT Destination Port
(natdport)
Post-NAT destination port.
Flags (flags) 32-bit field that provides details on session; this field can be
decoded by AND-ing the values with the logged value:
• 0x80000000—session has a packet capture (PCAP)
• 0x40000000—option is enabled to allow a client to use multiple
paths to connect to a destination host
• 0x20000000—file is submitted to WildFire for a verdict
• 0x10000000—enterprise credential submission by end user
detected
• 0x08000000— source for the flow is on an allow list and not
subject to recon protection
• 0x02000000—IPv6 session
• 0x01000000—SSL session is decrypted (SSL Proxy)
• 0x00800000—session is denied via URL filtering
• 0x00400000—session has a NAT translation performed
• 0x00200000—user information for the session was captured
through Authentication Portal
• 0x00100000—application traffic is on a non-standard destination
port
• 0x00080000 —X-Forwarded-For value from a proxy is in the
source user field
• 0x00040000 —log corresponds to a transaction within a http
proxy session (Proxy Transaction)
• 0x00020000—Client to Server flow is subject to policy based
forwarding
• 0x00010000—Server to Client flow is subject to policy based
forwarding
• 0x00008000 —session is a container page access (Container
Page)
• 0x00002000 —session has a temporary match on a rule for
implicit application dependency handling. Available in PAN-OS
5.0.0 and above.
PAN-OS® Administrator’s Guide Version 10.2 622 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
622 | Monitoring
Field Name Description
• 0x00000800 —symmetric return is used to forward traffic for
this session
• 0x00000400—decrypted traffic is being sent out clear text
through a mirror port
• 0x00000010—payload of the outer tunnel is being inspected
IP Protocol (proto) IP protocol associated with the session.
Action (action) Action taken for the session; values are alert, allow, deny, drop,
drop-all-packets, reset-client, reset-server, reset-both, block-url.
• alert—traffic containing matching data detected but not blocked
• allow (dlp subtype only)—flood detection alert
• block (dlp and WildFire subtype only) —traffic containing
matching data detected but blocked
• block-continue (dlp subtype only)—traffic containing matching
data is blocked and redirected to a Continue page with a button
for confirmation to proceed
• continue (dlp subtype only)—response to a block-continue page
indicating a block-continue request was allowed to proceed
• deny (dlp subtype only)—flood detection mechanism activated
and deny traffic based on configuration
URL/Filename (misc) Field with variable length. A Filename has a maximum of 63
characters.
File name when the subtype is dlp
URL when Threat Category is domain-edl.
Threat/Content Name
(threatid)
Palo Alto Networks identifier for known and custom threats. It
is a description string followed by a 64-bit numerical identifier in
parentheses for some Subtypes:
• 8000 – 8099— scan detection
• 8500 – 8599— flood detection
• 9999— URL filtering log
• 10000 – 19999 —spyware phone home detection
• 20000 – 29999 —spyware download detection
• 30000 – 44999 —vulnerability exploit detection
• 52000 – 52999— filetype detection
• 60000 – 69999 —data filtering detection
If the Domain EDL field is populated, then this field is populated
with the same value.
PAN-OS® Administrator’s Guide Version 10.2 623 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
623 | Monitoring
Field Name Description
Threat ID ranges for virus detection, WildFire signature
feed, and DNS C2 signatures used in previous releases
have been replaced with permanent, globally unique
IDs. Refer to the Threat/Content Type (subtype) and
Threat Category (thr_category) field names to create
updated reports, filter threat logs, and ACC activity.
Category (category) For URL Subtype, it is the URL Category; For WildFire subtype, it is
the verdict on the file and is either ‘malware’, ‘phishing’, ‘grayware’,
or ‘benign’; For other subtypes, the value is ‘any’.
Severity (severity) Severity associated with the threat; values are informational, low,
medium, high, critical.
Direction (direction) Indicates the direction of the attack:
• client-to-server
• server-to-client
Sequence Number
(seqno)
A 64-bit log entry identifier incremented sequentially. Each log type
has a unique number space.
Action Flags
(actionflags)
A bit field indicating if the log was forwarded to Panorama.
Source Country (srcloc) Source country or Internal region for private addresses. Maximum
length is 32 bytes.
Destination Country
(dstloc)
Destination country or Internal region for private addresses.
Maximum length is 32 bytes.
Content Type
(contenttype)
Applicable only when Subtype is URL.
Content type of the HTTP response data. Maximum length 32
bytes.
PCAP ID (pcap_id) The packet capture (pcap) ID is a 64 bit unsigned integral denoting
an ID to correlate threat pcap files with extended pcaps taken as
a part of that flow. All threat logs will contain either a pcap_id of 0
(no associated pcap), or an ID referencing the extended pcap file.
File Digest (filedigest) Only for WildFire subtype; all other types do not use this field
The filedigest string shows the binary hash of the file sent to be
analyzed by the WildFire service.
Cloud (cloud) Only for WildFire subtype; all other types do not use this field.
PAN-OS® Administrator’s Guide Version 10.2 624 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
624 | Monitoring
Field Name Description
The cloud string displays the FQDN of either the WildFire appliance
(private) or the WildFire cloud (public) from where the file was
uploaded for analysis.
URL Index (url_idx) Used in URL Filtering and WildFire subtypes.
When an application uses TCP keepalives to keep a connection
open for a length of time, all the log entries for that session have a
single session ID. In such cases, when you have a single threat log
(and session ID) that includes multiple URL entries, the url_idx is
a counter that allows you to correlate the order of each log entry
within the single session.
For example, to learn the URL of a file that the firewall forwarded
to WildFire for analysis, locate the session ID and the url_idx from
the WildFire Submissions log and search for the same session ID
and url_idx in your URL filtering logs. The log entry that matches
the session ID and url_idx will contain the URL of the file that was
forwarded to WildFire.
User Agent (user_agent) Only for the URL Filtering subtype; all other types do not use this
field.
The User Agent field specifies the web browser that the user used
to access the URL, for example Internet Explorer. This information
is sent in the HTTP request to the server.
File Type (filetype) Specifies the type of file that the firewall forwarded for analysis.
X-Forwarded-For (xff) Only for the URL Filtering subtype; all other types do not use this
field.
The X-Forwarded-For field in the HTTP header contains the IP
address of the user who requested the web page. It allows you to
identify the IP address of the user, which is useful particularly if
you have a proxy server on your network that replaces the user IP
address with its own address in the source IP address field of the
packet header.
Referer (referer) Only for the URL Filtering subtype; all other types do not use this
field.
The Referer field in the HTTP header contains the URL of the web
page that linked the user to another web page; it is the source
that redirected (referred) the user to the web page that is being
requested.
Sender (sender) Specifies the name of the sender of an email.
PAN-OS® Administrator’s Guide Version 10.2 625 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
625 | Monitoring
Field Name Description
Subject (subject) Specifies the subject of an email.
Recipient (recipient) Specifies the name of the receiver of an email.
Report ID (reportid) Identifies the analysis request on the firewall, WildFire cloud, or the
WildFire appliance.
Device Group Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicate the device
group’s location within a device group hierarchy. The firewall (or
virtual system) generating the log includes the identification number
of each ancestor in its device group hierarchy. The shared device
group (level 0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was
generated by a firewall (or virtual system) that belongs to device
group 45, and its ancestors are 34, and 12. To view the device
group names that correspond to the value 12, 34 or 45, use one of
the following methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dghierarchy></show>
Virtual System Name
(vsys_name)
The name of the virtual system associated with the session; only
valid on firewalls enabled for multiple virtual systems.
Device Name
(device_name)
The hostname of the firewall on which the session was logged.
Source VM UUID
(src_uuid)
Identifies the source universal unique identifier for a guest virtual
machine in the VMware NSX environment.
Destination VM UUID
(dst_uuid)
Identifies the destination universal unique identifier for a guest
virtual machine in the VMware NSX environment.
HTTP Method
(http_method)
Only in URL filtering logs. Describes the HTTP Method used in the
web request. Only the following methods are logged: Connect,
Delete, Get, Head, Options, Post, Put.
Tunnel ID/IMSI
(tunnel_id/imsi)
International Mobile Subscriber Identity (IMSI) is a unique number
allocated to each mobile subscriber in the GSM/UMTS/EPS system.
IMSI shall consist of decimal digits (0 through 9) only and maximum
number of digits allowed are 15.
Monitor Tag/IMEI
(monitortag/imei)
International Mobile Equipment Identity (IMEI) is a unique 15 or 16
digit number allocated to each mobile station equipment.
PAN-OS® Administrator’s Guide Version 10.2 626 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
626 | Monitoring
Field Name Description
Parent Session ID
(parent_session_id)
ID of the session in which this session is tunneled. Applies to inner
tunnel (if two levels of tunneling) or inside content (if one level of
tunneling) only.
Parent Session Start
Time (parent_start_time)
Year/month/day hours:minutes:seconds that the parent tunnel
session began.
Tunnel Type (tunnel) Type of tunnel, such as GRE or IPSec.
Threat Category
(thr_category)
Describes threat categories used to classify different types of threat
signatures.
If a domain external dynamic list generated the log, domain-edl
populates this field.
Content Version
(contentver)
Applications and Threats version on your firewall when the log was
generated.
SCTP Association ID
(assoc_id)
Number that identifies all connections for an association between
two SCTP endpoints.
Payload Protocol ID
(ppid)
ID of the protocol for the payload in the data portion of the
data chunk.
HTTP Headers
(http_headers)
Indicates the inserted HTTP header in the URL log entries on the
firewall.
URL Category List
(url_category_list)
Lists the URL Filtering categories that the firewall used to enforce
policy.
Rule UUID (rule_uuid) The UUID that permanently identifies the rule.
HTTP/2 Connection
(http2_connection)
Identifies if traffic used an HTTP/2 connection by displaying one of
the following values:
• TCP connection session ID—session is HTTP/2
• 0—session is not HTTP/2
Dynamic User
Group Name
(dynusergroup_name)
The name of the dynamic user group that contains the user who
initiated the session.
XFF Address (xff_ip) The IP address of the user who requested the web page or the IP
address of the next to last device that the request traversed. If the
request goes through one or more proxies, load balancers, or other
PAN-OS® Administrator’s Guide Version 10.2 627 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
627 | Monitoring
Field Name Description
upstream devices, the firewall displays the IP address of the most
recent device.
Source Device Category
(src_category)
The category for the device that Device-ID identifies as the source
of the traffic.
Source Device Profile
(src_profile)
The device profile for the device that Device-ID identifies as the
source of the traffic.
Source Device Model
(src_model)
The model of the device that Device-ID identifies as the source of
the traffic.
Source Device Vendor
(src_vendor)
The vendor of the device that Device-ID identifies as the source of
the traffic.
Source Device OS
Family (src_osfamily)
The operating system type for the device that Device-ID identifies
as the source of the traffic.
Source Device OS
Version (src_osversion)
The version of the operating system for the device that Device-ID
identifies as the source of the traffic.
Source Hostname
(src_host)
The hostname of the device that Device-ID identifies as the source
of the traffic.
Source MAC Address
(src_mac)
The MAC address for the device that Device-ID identifies as the
source of the traffic.
Destination Device
Category (dst_category)
The category for the device that Device-ID identifies as the
destination for the traffic.
Destination Device
Profile (dst_profile)
The device profile for the device that Device-ID identifies as the
destination for the traffic.
Destination Device
Model (dst_model)
The model of the device that Device-ID identifies as the destination
for the traffic.
Destination Device
Vendor (dst_vendor)
The vendor of the device that Device-ID identifies as the
destination for the traffic.
Destination Device OS
Family (dst_osfamily)
The operating system type for the device that Device-ID identifies
as the destination for the traffic.
Destination Device OS
Version (dst_osversion)
The version of the operating system for the device that Device-ID
identifies as the destination for the traffic.
Destination Hostname
(dst_host)
The hostname of the device that Device-ID identifies as the
destination for the traffic.
PAN-OS® Administrator’s Guide Version 10.2 628 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
628 | Monitoring
Field Name Description
Destination MAC
Address (dst_mac)
The MAC address for the device that Device-ID identifies as the
destination for the traffic.
Container ID
(container_id)
The container ID of the PAN-NGFW pod on the Kubernetes node
where the application POD is deployed.
POD Namespace
(pod_namespace)
The namespace of the application POD being secured.
POD Name (pod_name) The application POD being secured.
Source External
Dynamic List (src_edl)
The name of the external dynamic list that contains the source IP
address of the traffic.
Destination External
Dynamic List (dst_edl)
The name of the external dynamic list that contains the destination
IP address of the traffic.
Host ID (hostid) Unique ID GlobalProtect assigns to identify the host.
User Device Serial
Number (serialnumber)
Serial number of the user’s machine or device.
Domain EDL
(domain_edl)
The name of the external dynamic list that contains the domain
name of the traffic.
Source Dynamic
Address Group (src_dag)
Original session source dynamic address group.
Destination Dynamic
Address Group (dst_dag)
Original destination source dynamic address group.
Partial Hash
(partial_hash)
Machine Learning partial hash.
High Resolution
Timestamp (high_res
timestamp)
Time in milliseconds the log was received at the management plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
PAN-OS® Administrator’s Guide Version 10.2 629 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
629 | Monitoring
Field Name Description
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
The High Resolution Timestamp is supported for logs
received from managed firewalls running PAN-OS 10.1
and later releases. Logs received from managed firewalls
running PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00 timestamp
regardless of when the log was received.
Reason (reason) Reason for Data Filtering action.
Justification
(justification)
Justification for Data Filtering action.
A Slice Service Type
(nssai_sst)
The A Slice Service Type of the Network Slice ID.
Application Subcategory
(subcategory_of_app)
The application subcategory specified in the application
configuration properties.
Application Category
(category_of_app)
The application category specified in the application configuration
properties. Values are:
• business-systems
• collaboration
• general-internet
• media
• networking
• saas
Application Technology
(technology_of_app)
The application technology specified in the application
configuration properties. Values are:
• browser-based
• client-server
• network-protocol
• peer-to-peer
Application Risk
(risk_of_app)
Risk level associated with the application (1=lowest to 5=highest).
PAN-OS® Administrator’s Guide Version 10.2 630 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
630 | Monitoring
Field Name Description
Application
Characteristic
(characteristic_of_app)
Comma-separated list of applicable characteristic of the application
Application Container
(container_of_app)
The parent application for an application.
Tunneled Application
(tunneled_app)
Name of the tunneled application.
Application SaaS
(is_saas_of_app)
Displays yes if a SaaS application or no if not a SaaS application.
Application
Sanctioned State
(sanctioned_state_of_app)
Displays yes if application is sanctioned or no if application is not
sanctioned.
Cloud Report ID
(cloud_reportid)
(PAN-OS 10.2.0) Unique 32 character ID for a file scanned by the
DLP cloud service sent by a firewall.
(PAN-OS 10.2.1 and later releases) Unique 67 character ID for a file
scanned by the DLP cloud service sent by a firewall.
The same Cloud Report ID is displayed for a file the DLP cloud
service has already scanned and generated a Cloud Report ID for.
HIP Match Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE,
Generated Time, Source User, Virtual System, Machine Name, Operating System, Source Address,
HIP, Repeat Count, HIP Type, FUTURE_USE, FUTURE_USE, Sequence Number, Action Flags,
Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level
3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, Virtual System ID, IPv6
Source Address, Host ID, User Device Serial Number, Device MAC Address, High Resolution
Timestamp
Field Name Description
Receive Time
(receive_time or
cef-formattedreceive_time)
Time the log was received at the management plane.
Serial Number
(serial)
Serial number of the firewall that generated the log.
PAN-OS® Administrator’s Guide Version 10.2 631 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
631 | Monitoring
Field Name Description
Type (type) Specifies the type of log; value is HIP-MATCH.
Threat/Content
Type (subtype)
Subtype of HIP match log; unused.
Generated Time
(time_generated
or cef-formattedtime_generated)
Time the log was generated on the dataplane.
Source User
(srcuser)
Username of the user who initiated the session.
Virtual System (vsys) Virtual System associated with the HIP match log.
Machine Name
(machinename)
Name of the user’s machine.
Operating System
(os)
The operating system installed on the user’s machine or device (or on
the client system).
Source Address (src) IP address of the source user.
HIP (matchname) Name of the HIP object or profile.
Repeat Count
(repeatcnt)
Number of times the HIP profile matched.
HIP Type
(matchtype)
Whether the hip field represents a HIP object or a HIP profile.
Sequence Number
(seqno)
A 64-bit log entry identifier incremented sequentially; each log type has
a unique number space.
Action Flags
(actionflags)
A bit field indicating if the log was forwarded to Panorama.
Device Group
Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicate the device group’s
location within a device group hierarchy. The firewall (or virtual system)
generating the log includes the identification number of each ancestor
in its device group hierarchy. The shared device group (level 0) is not
included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45, and
its ancestors are 34, and 12. To view the device group names that
correspond to the value 12, 34 or 45, use one of the following methods:
PAN-OS® Administrator’s Guide Version 10.2 632 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
632 | Monitoring
Field Name Description
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dghierarchy></show>
Virtual System
Name (vsys_name)
The name of the virtual system associated with the session; only valid
on firewalls enabled for multiple virtual systems.
Device Name
(device_name)
The hostname of the firewall on which the session was logged.
Virtual System ID
(vsys_id)
A unique identifier for a virtual system on a Palo Alto Networks firewall.
IPv6 System
Address (srcipv6)
IPv6 address of the user’s machine or device.
Host ID (hostid) Unique ID GlobalProtect assigns to identify the host.
User Device
Serial Number
(serialnumber)
Serial number of the user’s machine or device.
Device MAC
Address (mac)
The MAC address of the user’s machine or device.
High Resolution
Timestamp
(high_res_timestamp)
Time in milliseconds the log was received at the management plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
PAN-OS® Administrator’s Guide Version 10.2 633 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
633 | Monitoring
Field Name Description
The High Resolution Timestamp is supported for logs
received from managed firewalls running PAN-OS 10.2
and later releases. Logs received from managed firewalls
running PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00 timestamp
regardless of when the log was received.
GlobalProtect Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE,
Generated Time, Virtual System, Event ID, Stage, Authentication Method, Tunnel Type, Source
User, Source Region, Machine Name, Public IP, Public IPv6, Private IP, Private IPv6, Host ID, Serial
Number, Client Version, Client OS, Client OS Version, Repeat Count, Reason, Error, Description,
Status, Location, Login Duration, Connect Method, Error Code, Portal, Sequence Number, Action
Flags, High Res Timestamp, Selection Type, Response Time, Priority, Attempted Gateways,
Gateway, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group
Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name, Virtual
System ID
Field Name Description
Receive Time
(receive_time)
The time that the log was received at the management plane.
Serial # (serial) The serial number of the firewall that generated the log.
Type (type) Specifies the type of log; value is GLOBALPROTECT.
Threat/Content Type
(subtype)
Subtype of threat log. Values include the following:
• data—Data pattern matching a Data Filtering profile.
• file—File type matching a File Blocking profile.
• flood—Flood detected via a Zone Protection profile.
• packet—Packet-based attack protection triggered by a Zone
Protection profile.
• scan—Scan detected via a Zone Protection profile.
• spyware —Spyware detected via an Anti-Spyware profile.
• url—URL filtering log.
• virus—Virus detected via an Antivirus profile.
• vulnerability —Vulnerability exploit detected via a Vulnerability
Protection profile.
• wildfire —A WildFire verdict generated when the firewall submits
a file to WildFire per a WildFire Analysis profile and a verdict
PAN-OS® Administrator’s Guide Version 10.2 634 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
634 | Monitoring
Field Name Description
(malicious, phishing, grayware, or benign, depending on what you
are logging) is logged in the WildFire Submissions log.
• wildfire-virus—Virus detected via an Antivirus profile.
Generate Time
(time_generated)
The time that the log was generated on the dataplane.
Virtual System (vsys) The Virtual System associated with the session.
Event ID (eventid) A string showing the name of the event.
Stage (stage) A string showing the stage of the connection (for example, beforelogin, login, or tunnel).
Authentication
Method
(auth_method)
A string showing the authentication type, such as LDAP, RADIUS, or
SAML.
Tunnel Type
(tunnel_type)
The type of tunnel (either SSLVPN or IPSec).
Source User (srcuser) The username of the user who initiated the session.
Source Region
(srcregion)
The region for the user who initiated the session.
Machine Name
(machinename)
The name of the user’s machine.
Public IP (public_ip) The public IP address for the user who initiated the session.
Public IPv6
(public_ipv6)
The public IPv6 address for the user who initiated the session.
Private IP (private_ip) The private IP address for the user who initiated the session.
Private IPv6
(private_ipv6)
The private IPv6 address for the user who initiated the session.
Host ID (hostid) The unique ID that GlobalProtect assigns to identify the host.
Serial Number
(serialnumber)
The serial number of the user’s machine or device.
Client Version
(client_ver)
The client’s GlobalProtect app version.
PAN-OS® Administrator’s Guide Version 10.2 635 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
635 | Monitoring
Field Name Description
Client OS (client_os) The client device’s OS type (for example, Windows or Linux).
Client OS Version
(client_os_ver)
The client device’s OS version.
Repeat Count
(repeatcnt)
The number of sessions with the same source IP address, destination
IP address, application, and subtype that GlobalProtect has detected
within the last five seconds.
Reason (reason) A string that shows the reason for the quarantine.
Error (error) A string showing that error that has occurred in any event.
Description (opaque) Additional information for any event that has occurred.
Status (status) The status (success or failure) of the event.
Location (location) A string showing the administrator-defined location of the
GlobalProtect portal or gateway.
Login Duration
(login_duration)
The length of time, in seconds, the user is connected to the
GlobalProtect gateway from logging in to logging out.
Connect Method
(connect_method)
A string showing the how the GlobalProtect app connects to Gateway,
(for example, on-demand or user-logon.
Error Code
(error_code)
An integer associated with any errors that occurred.
Portal (portal) The name of the GlobalProtect portal or gateway.
Sequence Number
(seqno)
A 64-bit log entry identifier incremented sequentially; each log type
has a unique number space.
Action Flags
(actionflags)
A bit field indicating if the log was forwarded to Panorama.
Gateway
Selection Method
(selection_type)
The connection method that is selected to connect to the gateway.
• manual—The gateway to which you want the GlobalProtect app to
manually connect.
• preferred—The preferred gateway to which you want the
GlobalProtect app to connect.
• auto—Automatically connect to the Best Available gateway based
on the priority assigned to the gateway and the response time.
PAN-OS® Administrator’s Guide Version 10.2 636 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
636 | Monitoring
Field Name Description
SSL Response Time
(response_time)
The SSL response time of the selected gateway that is measured in
milliseconds on the endpoint during tunnel setup.
Gateway Priority
(priority)
The priority order of the gateway that is based on highest (1), high (2),
medium (3), low (4), or lowest (5) to which the GlobalProtect app can
connect.
Attempted Gateways
(attempted_gateways)
The fields that are collected for each gateway connection attempt
with the gateway name, SSL response time, and priority (see Gateway
Priority in a Multiple Gateway Configuration. Each field entry is
separated by commas such as g82-gateway,12,3. Each gateway
entry is separated by semicolons such as g83-gateway,10,2;g84-
gateway,-1,1.
Gateway Name
(gateway)
The name of the gateway that is specified on the portal configuration.
Device Group
Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicate the device group’s
location within a device group hierarchy. The firewall (or virtual
system) generating the log includes the identification number of each
ancestor in its device group hierarchy. The shared device group (level
0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45,
and its ancestors are 34, and 12. To view the device group names
that correspond to the value 12, 34 or 45, use one of the following
methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dghierarchy></show>
Virtual System Name
(vsys_name)
The name of the virtual system associated with the session; only valid
on firewalls enabled for multiple virtual systems.
Device Name
(device_name)
The hostname of the firewall on which the session was logged.
Virtual System ID
(vsys_id)
A unique identifier for a virtual system on a Palo Alto Networks
firewall.
IP-Tag Log Fields
Format: FUTURE_USE , Receive Time, Serial, Type, Threat/Content Type, FUTURE_USE,
Generate Time, Virtual System, Source IP, Tag Name , Event ID, Repeat Count , Timeout, Data
PAN-OS® Administrator’s Guide Version 10.2 637 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
637 | Monitoring
Source Name, Data Source Type, Data Source Subtype, Sequence Number, Action Flags, DG
Hierarchy Level 1 , DG Hierarchy Level 2, DG Hierarchy Level 3, DG Hierarchy Level 4, Virtual
System Name, Device Name, Virtual System ID, High Resolution Timestamp
Field Name Description
Receive Time
(receive_time or
cef-formattedreceive_time)
The time the log was received at the management plane.
Serial Number (serial) The serial number of the firewall that generated the log.
Type (type) Specifies the type of log; value is IPTAG.
Threat/Content Type
(subtype)
The subtype of the HIP match log; unused.
Generated Time
(time_generated
or cef-formattedtime_generated)
The time the log was generated on the dataplane.
Virtual System (vsys) The virtual system associated with the HIP match log.
Source IP (src) The IP address of the source user.
Tag Name (tag_name) The tag mapped to the source IP address.
Event ID (event_id) A string showing the name of the event.
Repeat Count
(repeatcnt)
The number of sessions with the same Source IP, Destination IP,
Application, and Subtype seen within 5 seconds.
Timeout (timeout) The amount of time before the IP address-to-tag mapping expires for
the source IP address.
Data Source Name
(datasourcename)
The name of the source from which mapping information is collected.
Data Source Type
(datasource_type)
The source from which mapping information is collected.
Data Source Subtype
(datasource_subtype)
The mechanism used to identify the IP address-to-username mappings
within a data source.
Sequence Number
(seqno)
A 64-bit log entry identifier incremented sequentially. Each log type
has a unique number space.
PAN-OS® Administrator’s Guide Version 10.2 638 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
638 | Monitoring
Field Name Description
Action Flags
(actionflags)
A bit field indicating whether the log was forwarded to Panorama.
Device Group
Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicates the location of the
device group within a device group hierarchy. The firewall (or virtual
system) generating the log includes the identification number of each
ancestor in its device group hierarchy except the shared device group
(level 0), which is not included in this structure.
If the log values are 12, 34, 45, and 0, it means that the log was
generated by a firewall (or virtual system) that belongs to device group
45 and its ancestors are 34 and 12. To view the device group names
that correspond to the value 12, 34, or 45, use one of the following
methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dghierarchy></show>
Virtual System Name
(vsys_name)
The name of the virtual system associated with the session; only valid
on firewalls enabled for multiple virtual systems.
Device Name
(device_name)
The hostname of the firewall on which the session was logged.
Virtual System ID
(vsys_id)
A unique identifier for a virtual system on a Palo Alto Networks
firewall.
High Resolution
Timestamp (high_res
timestamp)
Time in milliseconds the log was received at the management plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
PAN-OS® Administrator’s Guide Version 10.2 639 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
639 | Monitoring
Field Name Description
The High Resolution Timestamp is supported for logs
received from managed firewalls running PAN-OS 10.2
and later releases. Logs received from managed firewalls
running PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00 timestamp
regardless of when the log was received.
User-ID Log Fields
Format: FUTURE_USER, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE,
Generated Time, Virtual System, Source IP, User, Data Source Name, Event ID, Repeat Count,
Time Out Threshold, Source Port, Destination Port, Data Source, Data Source Type, Sequence
Number, Action Flags, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device
Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name,
Virtual System ID, Factor Type, Factor Completion Time, Factor Number, User Group Flags, User
by Source, Tag Name, High Resolution Timestamp
Field Name Description
Receive Time
(receive_time or cefformatted-receive_time)
Time the log was received at the management plane.
Serial Number (serial) Serial number of the firewall that generated the log.
Type (type) Specifies the type of log; value is USERID.
Threat/Content Type
(subtype)
Subtype of User-ID log; values are login, logout, register-tag, and
unregister-tag.
• login—User logged in.
• logout—User logged out.
• register-tag—Indicates a tag or tags were registered for the user.
• unregister-tag—Indicates a tag or tags were unregistered for the
user.
Generated Time
(time_generated
or cef-formattedtime_generated)
The time the log was generated on the dataplane.
Virtual System (vsys) Virtual System associated with the configuration log.
Source IP (ip) Original session source IP address.
PAN-OS® Administrator’s Guide Version 10.2 640 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
640 | Monitoring
Field Name Description
User (user) Identifies the end user.
Data Source Name
(datasourcename)
User-ID source that sends the IP (Port)-User Mapping.
Event ID (eventid) String showing the name of the event.
Repeat Count
(repeatcnt)
Number of sessions with same Source IP, Destination IP,
Application, and Subtype seen within 5 seconds.
Time Out Threshold
(timeout)
Timeout after which the IP/User Mappings are cleared.
Source Port (beginport) Source port utilized by the session.
Destination Port
(endport)
Destination port utilized by the session.
Data Source
(datasource)
Source from which mapping information is collected.
Data Source Type
(datasourcetype)
Mechanism used to identify the IP/User mappings within a data
source.
Sequence Number
(seqno)
Serial number of the firewall that generated the log.
Action Flags
(actionflags)
A bit field indicating if the log was forwarded to Panorama.
Device Group Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicate the device
group’s location within a device group hierarchy. The firewall (or
virtual system) generating the log includes the identification number
of each ancestor in its device group hierarchy. The shared device
group (level 0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was
generated by a firewall (or virtual system) that belongs to device
group 45, and its ancestors are 34, and 12. To view the device
group names that correspond to the value 12, 34 or 45, use one of
the following methods:
API query: /api/?type=op&cmd=<show><dg-hierarchy></
dg-hierarchy></show>
Virtual System Name
(vsys_name)
The name of the virtual system associated with the session; only
valid on firewalls enabled for multiple virtual systems.
PAN-OS® Administrator’s Guide Version 10.2 641 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
641 | Monitoring
Field Name Description
Device Name
(device_name)
The hostname of the firewall on which the session was logged.
Virtual System ID
(vsys_id)
A unique identifier for a virtual system on a Palo Alto Networks
firewall.
Factor Type (factortype) Vendor used to authenticate a user when Multi Factor
authentication is present.
Factor Completion Time
(factorcompletiontime)
Time the authentication was completed.
Factor Number
(factorno)
Indicates the use of primary authentication (1) or additional factors
(2, 3).
User Group Flags
(ugflags)
Displays whether the user group that was found during user group
mapping. Supported values are:
• User Group Found—Indicates whether the user could be mapped
to a group.
• Duplicate User—Indicates whether duplicate users were found in
a user group. Displays N/A if no user group is found.
User by Source
(userbysource)
Indicates the username received from the source through IP
address-to-username mapping.
Tag Name (tag_name) Name of the tag associated with the dynamic user group associated
with the User Group the user is mapped to.
High Resolution
Timestamp (high_res
timestamp)
Time in milliseconds the log was received at the management plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
PAN-OS® Administrator’s Guide Version 10.2 642 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
642 | Monitoring
Field Name Description
The High Resolution Timestamp is supported for logs
received from managed firewalls running PAN-OS 10.2
and later releases. Logs received from managed firewalls
running PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00 timestamp
regardless of when the log was received.
Decryption Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, Config Version,
Generate Time, Source Address, Destination Address, NAT Source IP, NAT Destination IP, Rule,
Source User, Destination User, Application, Virtual System, Source Zone, Destination Zone,
Inbound Interface, Outbound Interface, Log Action, Time Logged, Session ID, Repeat Count,
Source Port, Destination Port, NAT Source Port, NAT Destination Port, Flags, IP Protocol, Action,
Tunnel, FUTURE_USE, FUTURE_USE, Source VM UUID, Destination VM UUID, UUID for rule,
Stage for Client to Firewall, Stage for Firewall to Server, TLS Version, Key Exchange Algorithm,
Encryption Algorithm, Hash Algorithm, Policy Name, Elliptic Curve, Error Index, Root Status,
Chain Status, Proxy Type, Certificate Serial Number, Fingerprint, Certificate Start Date, Certificate
End Date, Certificate Version, Certificate Size, Common Name Length, Issuer Common Name
Length, Root Common Name Length, SNI Length, Certificate Flags, Subject Common Name,
Issuer Subject Common Name, Root Subject Common Name, Server Name Indication, Error,
Container ID, POD Namespace, POD Name, Source External Dynamic List, Destination External
Dynamic List, Source Dynamic Address Group, Destination Dynamic Address Group, High Res
Timestamp, Source Device Category, Source Device Profile, Source Device Model, Source Device
Vendor, Source Device OS Family, Source Device OS Version, Source Hostname, Source Mac
Address, Destination Device Category, Destination Device Profile, Destination Device Model,
Destination Device Vendor, Destination Device OS Family, Destination Device OS Version,
Destination Hostname, Destination Mac Address, Sequence Number, Action Flags, Device Group
Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device
Group Hierarchy Level 4, Virtual System Name, Device Name, Virtual System ID, Application
Subcategory, Application Category, Application Technology, Application Risk, Application
Characteristic, Application Container, Application SaaS, Application Sanctioned State
Field Name Description
Receive Time
(receive_time or
cef-formattedreceive_time)
Time the log was received at the management plane.
Serial Number (serial) Serial number of the firewall that generated the log.
Type (type) Specifies the type of log; value is DECRYPTION.
Threat/ContentType
(subtype)
Not used in the Decryption log.
PAN-OS® Administrator’s Guide Version 10.2 643 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
643 | Monitoring
Field Name Description
Config Version
(config_ver)
The software version.
Generate Time
(time_generated)
Time the log was generated on the dataplane.
Source Address (src) Original session source IP address.
Destination Address
(dst)
Original session destination IP address.
NAT Source IP
(natsrc)
If Source NAT performed, the post-NAT Source IP address.
NAT Destination IP
(natdst)
If Destination NAT performed, the post-NAT Destination IP address.
Rule (rule) Security policy rule that controls the session traffic.
Source User (srcuser) Username of the user who initiated the session.
Destination User
(dstuser)
Username of the user to which the session was destined.
Application (app) Application associated with the session.
Virtual System (vsys) Virtual System associated with the session.
Source Zone (from) Zone the session was sourced from.
Destination Zone (to) Zone the session was destined to.
Inbound Interface
(inbound_if)
Interface that the session was sourced from.
Outbound Interface
(outbound_if)
Interface that the session was destined to.
Log Action (logset) Log Forwarding profile applied to the session.
Time Logged
(time_received)
The time the log was received.
Session ID (sessionid) An internal numerical identifier applied to each session.
PAN-OS® Administrator’s Guide Version 10.2 644 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
644 | Monitoring
Field Name Description
Repeat Count
(repeatcnt)
Number of sessions with the same Source IP, Destination IP,
Application, and Content/Threat Type seen within 5 seconds.
Source Port (sport) Source port utilized by the session.
Destination Port
(dport)
Destination port utilized by the session.
NAT Source Port
(natsport)
Post-NAT source port.
NAT Destination Port
(natdport)
Post-NAT destination port.
Flags (flags) 32-bit field that provides details on session; this field can be decoded
by AND-ing the values with the logged value:
• 0x80000000—session has a packet capture (PCAP)
• 0x40000000—option is enabled to allow a client to use multiple
paths to connect to a destination host
• 0x20000000—file is submitted to WildFire for a verdict
• 0x10000000—enterprise credential submission by end user
detected
• 0x08000000— source for the flow is on the allow list and not
subject to recon protection
• 0x02000000—IPv6 session
• 0x01000000—SSL session is decrypted (SSL Proxy)
• 0x00800000—session is denied via URL filtering
• 0x00400000—session has a NAT translation performed
• 0x00200000—user information for the session was captured
through Authentication Portal
• 0x00100000—application traffic is on a non-standard destination
port
• 0x00080000 —X-Forwarded-For value from a proxy is in the source
user field
• 0x00040000—log corresponds to a transaction within a http proxy
session (Proxy Transaction)
• 0x00020000—Client to Server flow is subject to policy based
forwarding
• 0x00010000—Server to Client flow is subject to policy based
forwarding
• 0x00008000—session is a container page access (Container Page)
PAN-OS® Administrator’s Guide Version 10.2 645 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
645 | Monitoring
Field Name Description
• 0x00002000—session has a temporary match on a rule for implicit
application dependency handling. Available in PAN-OS 5.0.0 and
above.
• 0x00000800—symmetric return is used to forward traffic for this
session
• 0x00000400—decrypted traffic is being sent out clear text through
a mirror port
• 0x00000100—payload of the outer tunnel is being inspected
IP Protocol (proto) IP protocol associated with the session.
Action (action) Action taken for the session; possible values are:
• allow—session was allowed by policy
• deny—session was denied by policy
• drop—session was dropped silently
• drop ICMP—session was silently dropped with an ICMP
unreachable message to the host or application
• reset both—session was terminated and a TCP reset is sent to both
the sides of the connection
• reset client—session was terminated and a TCP reset is sent to the
client
• reset server—session was terminated and a TCP reset is sent to the
server
Tunnel (tunnel) Type of tunnel.
Source VM UUID
(src_uuid)
The source universal unique identifier for a guest virtual machine in
the VMware NSX environment.
Destination VM
UUID (dst_uuid)
The destination universal unique identifier for a guest virtual machine
in the VMware NSX environment.
UUID for rule
(rule_uuid)
The UUID that permanently identifies the rule.
Stage for Client
to Firewall
(hs_stage_c2f)
The stage of the TLS handshake from the client to the firewall, for
example, Client Hello, Server Hello, Certificate, Client/Server key
exchange, etc.
Stage for Firewall to
Server (hs_stage_f2s)
The stage of the TLS handshake from the firewall to the server.
PAN-OS® Administrator’s Guide Version 10.2 646 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
646 | Monitoring
Field Name Description
TLS Version
(tls_version)
The version of TLS protocol used for the session.
Key Exchange
Algorithm
(tls_keyxchg)
The key exchange algorithm used for the session.
Encryption Algorithm
(tls_enc)
The algorithm used to encrypt the session data, such as AES-128-CBC,
AES-256-GCM, etc.
Hash Algorithm
(tls_auth)
The authentication algorithm used for the session, for example, SHA,
SHA256, SHA384, etc.
Policy Name
(policy_name)
The name of the Decryption policy associated with the session.
Elliptic Curve
(ec_curve)
The elliptic cryptography curve that the client and server negotiate
and use for connections that use ECDHE cipher suites.
Error Index
(err_index)
The type of error that occurred: Cipher, Resource, Resume, Version,
Protocol, Certificate, Feature, or HSM.
Root Status
(root_status)
The status of the root certificate, for example, trusted, untrusted, or
uninspected.
Chain Status
(chain_status)
Whether the chain is trusted. Values are:
• Uninspected
• Untrusted
• Trusted
• Incomplete
Proxy Type
(proxy_type)
The Decryption proxy type, such as Forward for Forward Proxy,
Inbound for Inbound Inspection, No Decrypt for undecrypted traffic,
GlobalProtect, etc.
Certificate Serial
Number (cert_serial)
The unique identifier of the certificate (generated by the certificate
issuer).
Certificate
Fingerprint
(fingerprint)
A hash of the certificate in x509 binary format.
Certificate Start Date
(notbefore)
The time the certificate became valid (certificate in invalid before this
time).
PAN-OS® Administrator’s Guide Version 10.2 647 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
647 | Monitoring
Field Name Description
Certificate End Date
(notafter)
The time the certificate expires (certificate becomes invalid after this
time).
Certificate Version
(cert_ver)
The certificate version (V1, V2, or V3).
Certificate Size
(cert_size)
The certificate key size.
Common Name
Length (cn_len)
The length of the subject common name.
Issuer Common
Name Length
(issuer_len)
The length of the issuer common name.
Root Common Name
Length (rootcn_len)
The length of the root common name.
SNI Length (sni_len) The length of the Server Name Indication (hostname).
Certificate Flags
(cert_flags)
The certificate flags can return seven values:
• Session is resumed (b_resume_session)
• Certificate (subject) common name is truncated
(b_cert_cn_truncated)
• Issuer common name is truncated (b_issuer_cn_truncated)
• Root common name is truncated (b_root_cn_truncated)
• Server Name Indication (SNI) is truncated (b_sni_truncated)
• Certificate type, RSA or ECDSA (b_cert_type)
• Unused (padding3)
Subject Common
Name (cn)
The domain name (the name of the server that the certificate protects).
Issuer Common
Name (issuer_cn)
The name of the organization that verified the certificate’s contents.
Root Common Name
(root_cn)
The name of the root certificate authority.
Server Name
Indication
(sni)
The hostname of the server that the client is trying to contact. Using
SNIs enables a server to host multiple websites and present multiple
certificates on the same IP address and TCP port because each
website has a unique SNI.
PAN-OS® Administrator’s Guide Version 10.2 648 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
648 | Monitoring
Field Name Description
Error (error) A string showing the error that has occurred in the event.
Container ID
(container_id)
A unique alphanumeric string that identifies the container if the
firewall runs in a cloud container.
POD Namespace
(pod_namespace)
The name of the Kubernetes pod namespace.
POD Name
(pod_name)
The name of the kubernetes pod.
Source External
Dynamic List (src_edl)
The name of the external dynamic list that contains the source IP
address of the traffic.
Destination External
Dynamic List (dst_edl)
The name of the external dynamic list that contains the destination IP
address of the traffic.
Source Dynamic
Address Group
(src_dag)
The dynamic address group that Device-ID identifies as the source of
the traffic.
Destination Dynamic
Address Group
(dst_dag)
The dynamic address group that Device-ID identifies as the destination
for the traffic.
High Resolution
Timestamp
(high_res_timestamp)
Time in milliseconds the log was received at the management plane.
The format for this field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
PAN-OS® Administrator’s Guide Version 10.2 649 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
649 | Monitoring
Field Name Description
The High Resolution Timestamp is supported for logs
received from managed firewalls running PAN-OS 10.0
and later releases. Logs received from managed firewalls
running PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00 timestamp
regardless of when the log was received.
Source Device
Category
(src_category)
The category for the device that Device-ID identifies as the source of
the traffic.
Source Device Profile
(src_profile)
The device profile for the device that Device-ID identifies as the
source of the traffic.
Source Device Model
(src_model)
The model of the device that Device-ID identifies as the source of the
traffic.
Source Device
Vendor (src_vendor)
The vendor of the device that Device-ID identifies as the source of the
traffic.
Source Device OS
Family (src_osfamily)
The operating system type for the device that Device-ID identifies as
the source of the traffic.
Source Device
OS Version
(src_osversion)
The version of the operating system for the device that Device-ID
identifies as the source of the traffic.
Source Hostname
(src_host)
The hostname of the device that Device-ID identifies as the source of
the traffic.
Source MAC Address
(src_mac)
The MAC address for the device that Device-ID identifies as the
source of the traffic.
Destination
Device Category
(dst_category)
The category for the device that Device-ID identifies as the
destination for the traffic.
Destination Device
Profile (dst_profile)
The device profile for the device that Device-ID identifies as the
destination for the traffic.
Destination Device
Model (dst_model)
The model of the device that Device-ID identifies as the destination
for the traffic.
Destination Device
Vendor (dst_vendor)
The vendor of the device that Device-ID identifies as the destination
for the traffic.
PAN-OS® Administrator’s Guide Version 10.2 650 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
650 | Monitoring
Field Name Description
Destination
Device OS Family
(dst_osfamily)
The operating system type for the device that Device-ID identifies as
the destination for the traffic.
Destination
Device OS Version
(dst_osversion)
The version of the operating system for the device that Device-ID
identifies as the destination for the traffic.
Destination
Hostname (dst_host)
The hostname of the device that Device-ID identifies as the
destination for the traffic.
Destination MAC
Address (dst_mac)
The MAC address for the device that Device-ID identifies as the
destination for the traffic.
Sequence Number
(seqno)
A 64-bit log entry identifier incremented sequentially; each log type
has unique number space.
Action Flags
(actionflags)
A bit field indicating if the log was forwarded to Panorama.
Device Group
Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicate the device group’s
location within a device group hierarchy. The firewall (or virtual
system) generating the log includes the identification number of each
ancestor in its device group hierarchy. The shared device group (level
0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45,
and its ancestors are 34, and 12. To view the device group names
that correspond to the value 12, 34 or 45, use one of the following
methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dghierarchy></show>
Virtual System Name
(vsys_name)
The name of the virtual system associated with the session; only valid
on firewalls enabled for multiple virtual systems.
Device Name
(device_name)
The hostname of the firewall on which the session was logged.
Virtual System ID
(vsys_id)
A unique identifier for a virtual system on a Palo Alto Networks
firewall.
PAN-OS® Administrator’s Guide Version 10.2 651 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
651 | Monitoring
Field Name Description
Application
Subcategory
(subcategory_of_app)
The application subcategory specified in the application configuration
properties.
Application Category
(category_of_app)
The application category specified in the application configuration
properties. Values are:
• business-systems
• collaboration
• general-internet
• media
• networking
• saas
Application
Technology
(technology_of_app)
The application technology specified in the application configuration
properties. Values are:
• browser-based
• client-server
• network-protocol
• peer-to-peer
Application Risk
(risk_of_app)
Risk level associated with the application (1=lowest to 5=highest).
Application
Characteristic
(characteristic_of_app)
Comma-separated list of applicable characteristic of the application
Application Container
(container_of_app)
The parent application for an application.
Application SaaS
(is_saas_of_app)
Displays 1 if a SaaS application or 0 if not a SaaS application.
Application
Sanctioned State
(sanctioned_state_of_app)
Displays 1 if application is sanctioned or 0 if application is not
sanctioned.
Tunnel Inspection Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type, Subtype, FUTURE_USE, Generated
Time, Source Address, Destination Address, NAT Source IP, NAT Destination IP, Rule Name,
Source User, Destination User, Application, Virtual System, Source Zone, Destination Zone,
Inbound Interface, Outbound Interface, Log Action, FUTURE_USE, Session ID, Repeat Count,
PAN-OS® Administrator’s Guide Version 10.2 652 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
652 | Monitoring
Source Port, Destination Port, NAT Source Port, NAT Destination Port, Flags, Protocol, Action,
Severity, Sequence Number, Action Flags, Source Location, Destination Location, Device Group
Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device
Group Hierarchy Level 4, Virtual System Name, Device Name, Tunnel ID/IMSI, Monitor Tag/
IMEI, Parent Session ID, Parent Start Time, Tunnel, Bytes, Bytes Sent, Bytes Received, Packets,
Packets Sent, Packets Received, Maximum Encapsulation, Unknown Protocol, Strict Check,
Tunnel Fragment, Sessions Created, Sessions Closed, Session End Reason, Action Source, Start
Time, Elapsed Time, Tunnel Inspection Rule, Remote User IP, Remote User ID, Rule UUID, PCAP
ID, Dynamic User Group, Source External Dynamic List, Destination External Dynamic List, High
Resolution Timestamp, A Slice Differentiator, A Slice Service Type, PDU Session ID, Application
Subcategory, Application Category, Application Technology, Application Risk, Application
Characteristic, Application Container, Application SaaS, Application Sanctioned State
Field Name Description
Receive Time
(receive_time or
cef-formattedreceive_time)
Month, day, and time the log was received at the management plane.
Serial Number (serial) Serial number of the firewall that generated the log.
Type (type) Type of log as it pertains to the session: START or END.
Threat/Content Type
(subtype)
Subtype of traffic log; values are start, end, drop, and deny
• Start—session started
• End—session ended
• Drop—session dropped before the application is identified and
there is no rule that allows the session.
• Deny—session dropped after the application is identified and there
is a rule to block or no rule that allows the session.
Generated Time
(time_generated
or cef-formattedtime_generated)
Time the log was generated on the dataplane.
Source Address (src) Source IP address of packets in the session.
Destination Address
(dst)
Destination IP address of packets in the session.
NAT Source IP
(natsrc)
If Source NAT performed, the post-NAT Source IP address.
NAT Destination IP
(natdst)
If Destination NAT performed, the post-NAT Destination IP address.
PAN-OS® Administrator’s Guide Version 10.2 653 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
653 | Monitoring
Field Name Description
Rule Name (rule) Name of the Security policy rule in effect on the session.
Source User (srcuser) Source User ID of packets in the session.
Destination User
(dstuser)
Destination User ID of packets in the session.
Application (app) Tunneling protocol used in the session.
Virtual System (vsys) Virtual System associated with the session.
Source Zone (from) Source zone of packets in the session.
Destination Zone (to) Destination zone of packets in the session.
Inbound Interface
(inbound_if)
Interface that the session was sourced from.
Outbound Interface
(outbound_if)
Interface that the session was destined to.
Log Action (logset) Log Forwarding Profile that was applied to the session.
Session ID (sessionid) Session ID of the session being logged.
Repeat Count
(repeatcnt)
Number of sessions with same Source IP, Destination IP, Application,
and Subtype seen within 5 seconds.
Source Port (sport) Source port utilized by the session.
Destination Port
(dport)
Destination port utilized by the session.
NAT Source Port
(natsport)
Post-NAT source port.
NAT Destination Port
(natdport)
Post-NAT destination port.
Flags (flags) 32-bit field that provides details on session; this field can be decoded
by AND-ing the values with the logged value:
• 0x80000000 —session has a packet capture (PCAP)
• 0x02000000 —IPv6 session
• 0x01000000 —SSL session was decrypted (SSL Proxy)
• 0x00800000 —session was denied via URL filtering
PAN-OS® Administrator’s Guide Version 10.2 654 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
654 | Monitoring
Field Name Description
• 0x00400000 —session has a NAT translation performed (NAT)
• 0x00200000 —user information for the session was captured
through Authentication Portal
• 0x00080000 —X-Forwarded-For value from a proxy is in the source
user field
• 0x00040000 —log corresponds to a transaction within a http proxy
session (Proxy Transaction)
• 0x00008000 —session is a container page access (Container Page)
• 0x00002000 —session has a temporary match on a rule for implicit
application dependency handling. Available in PAN-OS 5.0.0 and
above.
• 0x00000800 —symmetric return was used to forward traffic for this
session
IP Protocol (proto) IP protocol associated with the session.
Action (action) Action taken for the session; possible values are:
• Allow—session was allowed by policy
• Deny—session was denied by policy
• Drop—session was dropped silently
• Drop ICMP—session was silently dropped with an ICMP
unreachable message to the host or application
• Reset both—session was terminated and a TCP reset is sent to both
the sides of the connection
• Reset client—session was terminated and a TCP reset is sent to the
client
• Reset server—session was terminated and a TCP reset is sent to the
server
Severity (severity) Severity associated with the event; values are informational, low,
medium, high, critical.
Sequence Number
(seqno)
A 64-bit log entry identifier incremented sequentially; each log type
has a unique number space. This field is not supported on PA-7000
Series firewalls.
Action Flags
(actionflags)
A bit field indicating if the log was forwarded to Panorama.
Source Location
(srcloc)
Source country or Internal region for private addresses; maximum
length is 32 bytes.
PAN-OS® Administrator’s Guide Version 10.2 655 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
655 | Monitoring
Field Name Description
Destination Location
(dstloc)
Destination country or Internal region for private addresses. Maximum
length is 32 bytes.
Device Group
Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicate the device group’s
location within a device group hierarchy. The firewall (or virtual
system) generating the log includes the identification number of each
ancestor in its device group hierarchy. The shared device group (level
0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45,
and its ancestors are 34, and 12. To view the device group names
that correspond to the value 12, 34 or 45, use one of the following
methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dghierarchy></show>
Virtual System Name
(vsys_name)
The name of the virtual system associated with the session; only valid
on firewalls enabled for multiple virtual systems.
Device Name
(device_name)
The hostname of the firewall on which the session was logged.
Tunnel ID (tunnelid) ID of the tunnel being inspected or the International Mobile Subscriber
Identity (IMSI) ID of the mobile user.
Monitor Tag
(monitortag)
Monitor name you configured for the Tunnel Inspection policy rule or
the International Mobile Equipment Identity (IMEI) ID of the mobile
device.
Parent Session ID
(parent_session_id)
ID of the session in which this session is tunneled. Applies to inner
tunnel (if two levels of tunneling) or inside content (if one level of
tunneling) only.
Parent Start Time
(parent_start_time)
Year/month/day hours:minutes:seconds that the parent tunnel session
began.
Tunnel Type (tunnel) Type of tunnel, such as GRE or IPSec.
Bytes (bytes) Number of bytes in the session.
Bytes Sent
(bytes_sent)
Number of bytes in the client-to-server direction of the session.
PAN-OS® Administrator’s Guide Version 10.2 656 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
656 | Monitoring
Field Name Description
Bytes Received
(bytes_received)
Number of bytes in the server-to-client direction of the session.
Packets (packets) Number of total packets (transmit and receive) for the session.
Packets Sent
(pkts_sent)
Number of client-to-server packets for the session.
Packets Received
(pkts_received)
Number of server-to-client packets for the session.
Maximum
Encapsulation
(max_encap)
Number of packets the firewall dropped because the packet exceeded
the maximum number of encapsulation levels configured in the Tunnel
Inspection policy rule (Drop packet if over maximum tunnel inspection
level).
Unknown Protocol
(unknown_proto)
Number of packets the firewall dropped because the packet contains
an unknown protocol, as enabled in the Tunnel Inspection policy rule
(Drop packet if unknown protocol inside tunnel).
Strict Checking
(strict_check)
Number of packets the firewall dropped because the tunnel protocol
header in the packet failed to comply with the RFC for the tunnel
protocol, as enabled in the Tunnel Inspection policy rule (Drop packet
if tunnel protocol fails strict header check).
Tunnel Fragment
(tunnel_fragment)
Number of packets the firewall dropped because of fragmentation
errors.
Sessions Created
(sessions_created)
Number of inner sessions created.
Sessions Closed
(sessions_closed)
Number of completed/closed sessions created.
Session End Reason
(session_end_reason)
The reason a session terminated. If the termination had multiple
causes, this field displays only the highest priority reason. The possible
session end reason values are as follows, in order of priority (where the
first is highest):
• threat—The firewall detected a threat associated with a reset, drop,
or block (IP address) action.
• policy-deny—The session matched a security rule with a deny or
drop action.
• decrypt-cert-validation—The session terminated because you
configured the firewall to block SSL forward proxy decryption or
SSL inbound inspection when the session uses client authentication
or when the session uses a server certificate with any of the
PAN-OS® Administrator’s Guide Version 10.2 657 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
657 | Monitoring
Field Name Description
following conditions: expired, untrusted issuer, unknown status, or
status verification time-out. This session end reason also displays
when the server certificate produces a fatal error alert of type
bad_certificate, unsupported_certificate, certificate_revoked,
access_denied, or no_certificate_RESERVED (SSLv3 only).
• decrypt-unsupport-param—The session terminated because you
configured the firewall to block SSL forward proxy decryption or
SSL inbound inspection when the session uses an unsupported
protocol version, cipher, or SSH algorithm. This session end
reason is displays when the session produces a fatal error
alert of type unsupported_extension, unexpected_message, or
handshake_failure.
• decrypt-error—The session terminated because you configured
the firewall to block SSL forward proxy decryption or SSL inbound
inspection when firewall resources or the hardware security module
(HSM) were unavailable. This session end reason is also displayed
when you configured the firewall to block SSL traffic that has SSH
errors or that produced any fatal error alert other than those listed
for the decrypt-cert-validation and decrypt-unsupport-param end
reasons.
• tcp-rst-from-client—The client sent a TCP reset to the server.
• tcp-rst-from-server—The server sent a TCP reset to the client.
• resources-unavailable—The session dropped because of a system
resource limitation. For example, the session could have exceeded
the number of out-of-order packets allowed per flow or the global
out-of-order packet queue.
• tcp-fin—One host or both hosts in the connection sent a TCP FIN
message to close the session.
• tcp-reuse—A session is reused and the firewall closes the previous
session.
• decoder—The decoder detects a new connection within the
protocol (such as HTTP-Proxy) and ends the previous connection.
• aged-out—The session aged out.
• unknown—This value applies in the following situations:
• Session terminations that the preceding reasons do not cover
(for example, a clear session all command).
• For logs generated in a PAN-OS release that does not support
the session end reason field (releases older than PAN-OS 6.1),
the value will be unknown after an upgrade to the current PANOS release or after the logs are loaded onto the firewall.
• In Panorama, logs received from firewalls for which the PAN-OS
version does not support session end reasons will have a value of
unknown.
PAN-OS® Administrator’s Guide Version 10.2 658 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
658 | Monitoring
Field Name Description
• n/a—This value applies when the traffic log type is not end.
Action Source
(action_source)
Specifies whether the action taken to allow or block an application was
defined in the application or in policy. The actions can be allow, deny,
drop, reset- server, reset-client or reset-both for the session.
Start Time (start) Year/month/day hours:minutes:seconds that the session began.
Elapsed Time
(elapsed)
Elapsed time of the session.
Tunnel
Inspection Rule
(tunnel_insp_rule)
Name of the tunnel inspection rule matching the cleartext tunnel
traffic.
Remote User IP
(remote_user_ip)
IPv4 or IPv6 address of a remote user.
Remote User ID
(remote_user_id)
IMSI identity of a remote user, and if available, one IMEI identity or
one MSISDN identity.
Security Rule UUID
(rule_uuid)
The UUID that permanently identifies the rule.
PCAP ID (pcap_id) Unique packet capture ID that defines the location of the pcap file on
the firewall.
Dynamic User
Group Name
(dynusergroup_name)
The name of the dynamic user group that contains the user who
initiated the session.
Source External
Dynamic List (src_edl)
The name of the external dynamic list that contains the source IP
address of the traffic.
Destination External
Dynamic List (dst_edl)
The name of the external dynamic list that contains the destination IP
address of the traffic.
High Resolution
Timestamp (high_res
timestamp)
Time in milliseconds the log was received at the management plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
PAN-OS® Administrator’s Guide Version 10.2 659 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
659 | Monitoring
Field Name Description
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
The High Resolution Timestamp is supported for logs
received from managed firewalls running PAN-OS 10.2
and later releases. Logs received from managed firewalls
running PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00 timestamp
regardless of when the log was received.
A Slice Differentiator
(nssai_sd)
The A Slice Differentiator of the Network Slice ID.
A Slice Service Type
(nssai_sd)
The A Slice Service Type of the Network Slice ID.
PDU Session ID
(pdu_session_id)
Session ID for the collection of L4 segments inside a tunnel.
Application
Subcategory
(subcategory_of_app)
The application subcategory specified in the application configuration
properties.
Application Category
(category_of_app)
The application category specified in the application configuration
properties. Values are:
• business-systems
• collaboration
• general-internet
• media
• networking
• saas
Application
Technology
(technology_of_app)
The application technology specified in the application configuration
properties. Values are:
• browser-based
• client-server
• network-protocol
• peer-to-peer
PAN-OS® Administrator’s Guide Version 10.2 660 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
660 | Monitoring
Field Name Description
Application Risk
(risk_of_app)
Risk level associated with the application (1=lowest to 5=highest).
Application
Characteristic
(characteristic_of_app)
Comma-separated list of applicable characteristic of the application
Application Container
(container_of_app)
The parent application for an application.
Application SaaS
(is_saas_of_app)
Displays 1 if a SaaS application or 0 if not a SaaS application.
Application
Sanctioned State
(sanctioned_state_of_app)
Displays 1 if application is sanctioned or 0 if application is not
sanctioned.
SCTP Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type, FUTURE_USE, FUTURE_USE,
Generated Time, Source Address, Destination Address, FUTURE_USE, FUTURE_USE, Rule Name,
FUTURE_USE, FUTURE_USE, FUTURE_USE, Virtual System, Source Zone, Destination Zone,
Inbound Interface, Outbound Interface, Log Action, FUTURE_USE, Session ID, Repeat Count,
Source Port, Destination Port, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, IP
Protocol, Action, Device Group Hierarchy Level 1, Device Group Hierarchy Level 2, Device
Group Hierarchy Level 3, Device Group Hierarchy Level 4, Virtual System Name, Device Name,
Sequence Number, FUTURE_USE, SCTP Association ID, Payload Protocol ID, Severity, SCTP
Chunk Type, FUTURE_USE, SCTP Verification Tag 1, SCTP Verification Tag 2, SCTP Cause
Code, Diameter App ID, Diameter Command Code, Diameter AVP Code, SCTP Stream ID, SCTP
Association End Reason, Op Code, SCCP Calling Party SSN, SCCP Calling Party Global Title, SCTP
Filter, SCTP Chunks, SCTP Chunks Sent, SCTP Chunks Received, Packets, Packets Sent, Packets
Received, UUID for rule, High Resolution Timestamp
Field Name Description
Receive Time (receive_time
or cef-formattedreceive_time)
Time the log was received at the management plane.
Serial Number (serial) Serial number of the firewall that generated the log.
Type (type) Specifies the type of log; value is SCTP.
PAN-OS® Administrator’s Guide Version 10.2 661 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
661 | Monitoring
Field Name Description
Generated Time
(time_generated or cefformatted-time_generated)
Time the log was generated on the dataplane.
Source Address (src) Original session source IP address.
Destination Address (dst) Original session destination IP address.
Rule Name (rule) Name of the Security policy rule in effect on the session.
Virtual System (vsys) Virtual System associated with the session.
Source Zone (from) Zone the session was sourced from.
Destination Zone (to) Zone the session was destined to.
Inbound Interface
(inbound_if)
Interface that the session was sourced from.
Outbound Interface
(outbound_if)
Interface that the session was destined to.
Log Action (logset) Log Forwarding Profile that was applied to the session.
Session ID (sessionid) An internal numerical identifier applied to each session.
Repeat Count (repeatcnt) Number of sessions with same Source IP, Destination IP,
Application, and Subtype seen within 5 seconds.
Source Port (sport) Source port utilized by the session.
Destination Port (dport) Destination port utilized by the session.
IP Protocol (proto) IP protocol associated with the session.
Action (action) Action taken for the session; possible values are:
• allow—session was allowed by the policy
• deny—session was denied by the policy
Device Group Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicate the device
group’s location within a device group hierarchy. The firewall
(or virtual system) generating the log includes the identification
number of each ancestor in its device group hierarchy. The
shared device group (level 0) is not included in this structure.
PAN-OS® Administrator’s Guide Version 10.2 662 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
662 | Monitoring
Field Name Description
If the log values are 12, 34, 45, 0, it means that the log was
generated by a firewall (or virtual system) that belongs to
device group 45, and its ancestors are 34, and 12. To view the
device group names that correspond to the value 12, 34 or 45,
use one of the following methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dghierarchy></show>
Virtual System Name
(vsys_name)
The name of the virtual system associated with the session;
only valid on firewalls enabled for multiple virtual systems.
Device Name (device_name) The hostname of the firewall on which the session was logged.
Sequence Number (seqno) A 64-bit log entry identifier incremented sequentially; each log
type has a unique number space.
SCTP Association ID
(assoc_id)
An internal 56-bit numerical logical identifier applied to each
SCTP association.
Payload Protocol ID (ppid) Identifies the Payload Protocol ID (PPID) in the data chunk
which triggered this event. PPID is assigned by Internet
Assigned Numbers Authority (IANA).
Severity (severity) Severity associated with the event; values are informational,
low, medium, high, critical.
SCTP Chunk Type
(sctp_chunk_type)
Describes the type of information contained in a chunk, such
as control or data.
SCTP Event Type
(sctp_event_type)
Defines the event triggered per SCTP chunk or packet when
SCTP protection profile is applied to the SCTP traffic. It is also
triggered by start or end of a SCTP association.
SCTP Verification Tag 1
(verif_tag_1)
Used by endpoint1 which initiates the association to verify if
the SCTP packet received belongs to current SCTP association
and validate the endpoint2.
SCTP Verification Tag 2
(verif_tag_2)
Used by endpoint2 to verify if the SCTP packet received
belongs to current SCTP association and validate the
endpoint1.
SCTP Cause Code
(sctp_cause_code)
Sent by an endpoint to specify reason for an error condition to
other endpoint of same SCTP association.
PAN-OS® Administrator’s Guide Version 10.2 663 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
663 | Monitoring
Field Name Description
Diameter App ID
(diam_app_id)
The diameter application in the data chunk which triggered
the event. Diameter Application ID is assigned by Internet
Assigned Numbers Authority (IANA).
Diameter Command Code
(diam_cmd_code)
The diameter command code in the data chunk which
triggered the event. Diameter Command Code is assigned by
Internet Assigned Numbers Authority (IANA)
Diameter AVP Code
(diam_avp_code)
The diameter AVP code in the data chunk which triggered the
event.
SCTP Stream ID (stream_id) ID of the stream which carries the data chunk which triggered
the event.
SCTP Association End
Reason (assoc_end_reason)
Reason an association was terminated. If the termination had
multiple causes, the highest priority reason is displayed. The
possible session end reasons in descending priority are:
• shutdown-from-endpoint (highest)—endpoint sends out
SHUTDOWN
• abort-from-endpoint—endpoint sends out ABORT
• unknown (lowest)—the association aged out, or association
termination reason is not covered by one of the previous
reasons (for example, a clear session all command).
Op Code (op_code) Identifies the operation code of application layer SS7
protocols, like MAP or CAP, in the data chunk which triggered
the event.
SCCP Calling Party SSN
(sccp_calling_ssn)
The Signaling Connection Control Part (SCCP) calling party
subsystem number (SSN) in the data chunk which triggered the
event.
SCCP Calling Party Global
Title (sccp_calling_gt)
The Signaling Connection Control Part (SCCP) calling party
global title (GT) in the data chunk which triggered the event.
SCTP Filter (sctp_filter) Name of the filter that the SCTP chunk matched.
SCTP Chunks (chunks) Number of total chunks (transmit and receive) for the
association.
SCTP Chunks Sent
(chunks_sent)
Number of endpoint1(which initiates association)-toendpoint2 chunks for the association.
SCTP Chunks Received
(chunks_received)
Number of endpoint2-to-endpoint1(which initiates
association) chunks for the association.
PAN-OS® Administrator’s Guide Version 10.2 664 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
664 | Monitoring
Field Name Description
Packets (packets) Number of total packets (transmit and receive) for the session.
Packets Sent (pkts_sent) Number of client-to-server packets for the session.
Packets Received
(pkts_received)
Number of server-to-client packets for the session.
UUID for rule (rule_uuid) The UUID that permanently identifies the rule.
High Resolution Timestamp
(high_res_timestamp)
Time in milliseconds the log was received at the management
plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
The High Resolution Timestamp is supported
for logs received from managed firewalls
running PAN-OS 10.2 and later releases.
Logs received from managed firewalls running
PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00
timestamp regardless of when the log was received.
Authentication Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE,
Generated Time, Virtual System, Source IP, User, Normalize User, Object, Authentication Policy,
Repeat Count, Authentication ID, Vendor, Log Action, Server Profile, Description, Client Type,
Event Type, Factor Number, Sequence Number, Action Flags, Device Group Hierarchy 1, Device
Group Hierarchy 2, Device Group Hierarchy 3, Device Group Hierarchy 4, Virtual System Name,
Device Name, Virtual System ID, Authentication Protocol, UUID for rule, High Resolution
Timestamp, Source Device Category, Source Device Profile, Source Device Model, Source Device
Vendor, Source Device OS Family, Source Device OS Version, Source Hostname, Source Mac
Address, Region, FUTURE_USE, User Agent, Session ID
PAN-OS® Administrator’s Guide Version 10.2 665 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
665 | Monitoring
Field Name Description
Receive Time
(receive_time or
cef-formattedreceive_time)
Time the log was received at the management plane.
Serial Number (serial) Serial number of the device that generated the log.
Type (type) Specifies the type of log; value is AUTHENTICATION.
Threat/Content Type
(subtype)
Subtype of the system log; refers to the system daemon generating
the log; values are crypto, dhcp, dnsproxy, dos, general, global-protect,
ha, hw, nat, ntpd, pbf, port, pppoe, ras, routing, satd, sslmgr, sslvpn,
userid, url-filtering, vpn.
Generated Time
(time_generated
or cef-formattedtime_generated)
Time the log was generated on the dataplane.
Virtual System (vsys) Virtual System associated with the session.
Source IP (ip) Original session source IP address.
User (user) End user being authenticated.
Normalize User
(normalize_user)
Normalized version of username being authenticated (such as
appending a domain name to the username).
Object (object) Name of the object associated with the system event.
Authentication Policy
(authpolicy)
Policy invoked for authentication before allowing access to a
protected resource.
Repeat Count
(repeatcnt)
Number of sessions with same Source IP, Destination IP, Application,
and Subtype seen within 5 seconds.
Authentication ID
(authid)
Unique ID given across primary authentication and additional (multi
factor) authentication.
Vendor (vendor) Vendor providing additional factor authentication.
Log Action (logset) Log Forwarding Profile that was applied to the session.
Server Profile
(serverprofile)
Authentication server used for authentication.
PAN-OS® Administrator’s Guide Version 10.2 666 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
666 | Monitoring
Field Name Description
Description (desc) Additional authentication information.
Client Type
(clienttype)
Type of client used to complete authentication (such as authentication
portal).
Event Type (event) Result of the authentication attempt.
Factor Number
(factorno)
Indicates the use of primary authentication (1) or additional factors (2,
3).
Sequence Number
(seqno)
A 64-bit log entry identifier incremented sequentially. Each log type
has a unique number space.
Action Flags
(actionflags)
A bit field indicating if the log was forwarded to Panorama.
Device Group
Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicate the device group’s
location within a device group hierarchy. The firewall (or virtual
system) generating the log includes the identification number of each
ancestor in its device group hierarchy. The shared device group (level
0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45,
and its ancestors are 34, and 12. To view the device group names
that correspond to the value 12, 34 or 45, use one of the following
methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dghierarchy></show>
Virtual System Name
(vsys_name)
The name of the virtual system associated with the session; only valid
on firewalls enabled for multiple virtual systems.
Device Name
(device_name)
The hostname of the firewall on which the session was logged.
Virtual System ID
(vsys_id)
A unique identifier for a virtual system on a Palo Alto Networks
firewall.
Authentication
Protocol (authproto)
Indicates the authentication protocol used by the server. For example,
PEAP with GTC.
UUID for rule
(rule_uuid)
The UUID that permanently identifies the rule.
PAN-OS® Administrator’s Guide Version 10.2 667 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
667 | Monitoring
Field Name Description
High Resolution
Timestamp (high_res
_timestamp)
Time in milliseconds the log was received at the management plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
The High Resolution Timestamp is supported for logs
received from managed firewalls running PAN-OS 10.2
and later releases. Logs received from managed firewalls
running PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00 timestamp
regardless of when the log was received.
Source Device
Category
(src_category)
The category for the device that Device-ID identifies as the source of
the traffic.
Source Device Profile
(src_profile)
The device profile for the device that Device-ID identifies as the
source of the traffic.
Source Device Model
(src_model)
The model of the device that Device-ID identifies as the source of the
traffic.
Source Device
Vendor (src_vendor)
The vendor of the device that Device-ID identifies as the source of the
traffic.
Source Device OS
Family (src_osfamily)
The operating system type for the device that Device-ID identifies as
the source of the traffic.
Source Device
OS Version
(src_osversion)
The version of the operating system for the device that Device-ID
identifies as the source of the traffic.
Source Hostname
(src_host)
The hostname of the device that Device-ID identifies as the source of
the traffic.
PAN-OS® Administrator’s Guide Version 10.2 668 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
668 | Monitoring
Field Name Description
Source MAC Address
(src_mac)
The MAC address for the device that Device-ID identifies as the
source of the traffic.
Region (region) The geographical region where the traffic originates.
User Agent
(user_agent)
The string from the HTTP request header User-Agent.
Session ID A string that uniquely identifies the traffic session.
Config Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type, Subtype, FUTURE_USE, Generated
Time, Host, Virtual System, Command, Admin, Client, Result, Configuration Path, Before Change
Detail, After Change Detail, Sequence Number, Action Flags, Device Group Hierarchy Level 1,
Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy
Level 4, Virtual System Name, Device Name, Device Group, Audit Comment, FUTURE_USE, High
Resolution Timestamp
Field Name Description
Receive Time
(receive_time or
cef-formattedreceive_time)
Time the log was received at the management plane.
Serial Number
(serial)
Serial number of the device that generated the log.
Type (type) Specifies the type of log; value is CONFIG.
Threat/Content
Type (subtype)
Subtype of the configuration log; unused.
Generated Time
(time_generated
or cef-formattedtime_generated)
Time the log was generated on the dataplane.
Host (host) Hostname or IP address of the client machine
Virtual System (vsys) Virtual System associated with the configuration log
Command (cmd) Command performed by the Admin; values are add, clone, commit,
delete, edit, move, rename, set.
PAN-OS® Administrator’s Guide Version 10.2 669 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
669 | Monitoring
Field Name Description
Admin (admin) Username of the Administrator performing the configuration
Client (client) Client used by the Administrator; values are Web and CLI
Result (result) Result of the configuration action; values are Submitted, Succeeded,
Failed, and Unauthorized
Configuration Path
(path)
The path of the configuration command issued; up to 512 bytes in
length
Before Change
Detail (beforechange-detail)
This field is in custom logs only; it is not in the default format.
It contains the full xpath before the configuration change.
After Change Detail
(after-change-detail)
This field is in custom logs only; it is not in the default format.
It contains the full xpath after the configuration change.
Sequence Number
(seqno)
A 64bit log entry identifier incremented sequentially; each log type has
a unique number space.
Action Flags
(actionflags)
A bit field indicating if the log was forwarded to Panorama.
Device Group
Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicate the device group’s
location within a device group hierarchy. The firewall (or virtual system)
generating the log includes the identification number of each ancestor
in its device group hierarchy. The shared device group (level 0) is not
included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45, and
its ancestors are 34, and 12. To view the device group names that
correspond to the value 12, 34 or 45, use one of the following methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dghierarchy></show>
Virtual System
Name (vsys_name)
The name of the virtual system associated with the session; only valid
on firewalls enabled for multiple virtual systems.
Device Name
(device_name)
The hostname of the firewall on which the session was logged.
Device Group
(dg_id)
The device group the firewall belongs to if managed by a Panorama™
management server.
PAN-OS® Administrator’s Guide Version 10.2 670 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
670 | Monitoring
Field Name Description
Audit Comment
(comment)
The audit comment entered in a policy rule configuration change.
High Resolution
Timestamp
(high_res_timestamp)
Time in milliseconds the log was received at the management plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
The High Resolution Timestamp is supported for logs
received from managed firewalls running PAN-OS 10.0
and later releases. Logs received from managed firewalls
running PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00 timestamp
regardless of when the log was received.
System Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type, Content/Threat Type, FUTURE_USE,
Generated Time, Virtual System, Event ID, Object, FUTURE_USE, FUTURE_USE, Module,
Severity, Description, Sequence Number, Action Flags, Device Group Hierarchy Level 1, Device
Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device Group Hierarchy Level 4,
Virtual System Name, Device Name, FUTURE_USE, FUTURE_USE, High Resolution Timestamp
Field Name Description
Receive Time
(receive_time or
cef-formattedreceive_time)
Time the log was received at the management plane.
Serial Number (serial) Serial number of the firewall that generated the log.
Type (type) Specifies the type of log; value is SYSTEM.
PAN-OS® Administrator’s Guide Version 10.2 671 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
671 | Monitoring
Field Name Description
Content/Threat Type
(subtype)
Subtype of the system log; refers to the system daemon generating
the log; values are crypto, dhcp, dnsproxy, dos, general, global-protect,
ha, hw, nat, ntpd, pbf, port, pppoe, ras, routing, satd, sslmgr, sslvpn,
userid, url-filtering, vpn.
Generated Time
(time_generated
or cef-formattedtime_generated)
Time the log was generated on the dataplane.
Virtual System (vsys) Virtual System associated with the configuration log.
Event ID (eventid) String showing the name of the event.
Object (object) Name of the object associated with the system event.
Module (module) This field is valid only when the value of the Subtype field is general. It
provides additional information about the sub-system generating the
log; values are general, management, auth, ha, upgrade, chassis.
Severity (severity) Severity associated with the event; values are informational, low,
medium, high, critical.
Description (opaque) Detailed description of the event, up to a maximum of 512 bytes.
Sequence Number
(seqno)
A 64-bit log entry identifier incremented sequentially; each log type
has a unique number space.
Action Flags
(actionflags)
A bit field indicating if the log was forwarded to Panorama.
Device Group
Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicate the device group’s
location within a device group hierarchy. The firewall (or virtual
system) generating the log includes the identification number of each
ancestor in its device group hierarchy. The shared device group (level
0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45,
and its ancestors are 34, and 12. To view the device group names
that correspond to the value 12, 34 or 45, use one of the following
methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dghierarchy></show>
PAN-OS® Administrator’s Guide Version 10.2 672 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
672 | Monitoring
Field Name Description
Virtual System Name
(vsys_name)
The name of the virtual system associated with the session; only valid
on firewalls enabled for multiple virtual systems.
Device Name
(device_name)
The hostname of the firewall on which the session was logged.
High Resolution
Timestamp
(high_res_timestamp)
Time in milliseconds the log was received at the management plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
• mm—Two-digit minute (00 through 59)
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
The High Resolution Timestamp is supported for logs
received from managed firewalls running PAN-OS 10.2
and later releases. Logs received from managed firewalls
running PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00 timestamp
regardless of when the log was received.
Correlated Events Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type, Content/Threat Type, FUTURE_USE,
Generated Time, Source Address. Source User, Virtual System, Category, Severity, Device Group
Hierarchy Level 1, Device Group Hierarchy Level 2, Device Group Hierarchy Level 3, Device
Group Hierarchy Level 4, Virtual System Name, Device Name, Virtual System ID, Object Name,
Object ID, Evidence
Field Name Description
Receive Time
(receive_time or
cef-formattedreceive_time)
Time the log was received at the management plane.
Serial Number (serial) Serial number of the device that generated the log.
PAN-OS® Administrator’s Guide Version 10.2 673 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
673 | Monitoring
Field Name Description
Type (type) Specifies the type of log; value is CORRELATION.
Content/Threat Type
(subtype)
Subtype of the system log; refers to the system daemon generating
the log; values are crypto, dhcp, dnsproxy, dos, general, global-protect,
ha, hw, nat, ntpd, pbf, port, pppoe, ras, routing, satd, sslmgr, sslvpn,
userid, url-filtering, vpn.
Generated Time
(time_generated
or cef-formattedtime_generated)
Time the log was generated on the dataplane.
Source Address (src) IP address of the user who initiated the event.
Source User (srcuser) Username of the user who initiated the event.
Virtual System (vsys) Virtual System associated with the configuration log.
Category (category) A summary of the kind of threat or harm posed to the network, user,
or host.
Severity (severity) Severity associated with the event; values are informational, low,
medium, high, critical.
Device Group
Hierarchy
(dg_hier_level_1 to
dg_hier_level_4)
A sequence of identification numbers that indicate the device group’s
location within a device group hierarchy. The firewall (or virtual
system) generating the log includes the identification number of each
ancestor in its device group hierarchy. The shared device group (level
0) is not included in this structure.
If the log values are 12, 34, 45, 0, it means that the log was generated
by a firewall (or virtual system) that belongs to device group 45,
and its ancestors are 34, and 12. To view the device group names
that correspond to the value 12, 34 or 45, use one of the following
methods:
API query:
/api/?type=op&cmd=<show><dg-hierarchy></dghierarchy></show>
Virtual System Name
(vsys_name)
The name of the virtual system associated with the session; only valid
on firewalls enabled for multiple virtual systems.
Device Name
(device_name)
The hostname of the firewall on which the session was logged.
PAN-OS® Administrator’s Guide Version 10.2 674 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
674 | Monitoring
Field Name Description
Virtual System ID
(vsys_id)
A unique identifier for a virtual system on a Palo Alto Networks
firewall.
Object Name
(objectname)
Name of the correlation object that was matched on.
Object ID (object_id) Name of the object associated with the system event.
Evidence (evidence) A summary statement that indicates how many times the host has
matched against the conditions defined in the correlation object. For
example, Host visited known malware URl (19 times).
GTP Log Fields
Format: FUTURE_USE, Receive Time, Serial Number, Type, Threat/Content Type, FUTURE_USE,
Generated Time, Source Address, Destination Address, FUTURE_USE, FUTURE_USE, Rule
Name, FUTURE_USE, FUTURE_USE, Application, Virtual System, Source Zone, Destination Zone,
Inbound Interface, Outbound Interface, Log Action, FUTURE_USE, Session ID, FUTURE_USE,
Source Port, Destination Port, FUTURE_USE, FUTURE_USE, FUTURE_USE, Protocol, Action,
GTP Event Type, MSISDN, Access Point Name, Radio Access Technology, GTP Message Type,
End User IP Address, Tunnel Endpoint Identifier1, Tunnel Endpoint Identifier2, GTP Interface,
GTP Cause, Severity, Serving Country MCC, Serving Network MNC, Area Code, Cell ID, GTP
Event Code, FUTURE_USE, FUTURE_USE, Source Location, Destination Location, FUTURE_USE,
FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE,
Tunnel ID/IMSI, Monitor Tag/IMEI, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE,
FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE,
FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, FUTURE_USE, Start
Time, Elapsed Time, Tunnel Inspection Rule, Remote User IP, Remote User ID, UUID for rule,
PCAP ID, High Resolution Timestamp, A Slice Service Type, A Slice Differentiator, Application
Subcategory, Application Category, Application Technology, Application Risk, Application
Characteristic, Application Container, Application SaaS, Application Sanctioned State
Field Name Description
Receive Time (receive_time
or cef-formattedreceive_time)
Month, Day and time the log was received at the management
plane.
Serial Number (serial) Serial number of the firewall that generated the log.
Type (type) Specifies the type of log; value is GTP.
Threat/Content Type
(subtype)
Subtype of traffic log; values are start, end, drop, and deny
• Start—session started
• End—session ended
PAN-OS® Administrator’s Guide Version 10.2 675 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
675 | Monitoring
Field Name Description
• Drop—session dropped before the application is identified
and there is no rule that allows the session.
• Deny—session dropped after the application is identified
and there is a rule to block or no rule that allows the
session.
Generated Time
(time_generated or cefformatted-time_generated)
Time the log was generated on the dataplane.
Source Address (src) Source IP address of packets in the session.
Destination Address (dst) Destination IP address of packets in the session.
Rule Name (rule) Name of the Security policy rule in effect on the session.
Application (app) Tunneling protocol used in the session.
Virtual System (vsys) Virtual System associated with the session.
Source Zone (from) Source zone of packets in the session.
Destination Zone (to) Destination zone of packets in the session.
Inbound Interface
(inbound_if)
Interface that the session was sourced from.
Outbound Interface
(outbound_if)
Interface that the session was destined to.
Log Action (logset) Log Forwarding Profile that was applied to the session.
Session ID (sessionid) Session ID of the session being logged.
Source Port (sport) Source port utilized by the session.
Destination Port (dport) Destination port utilized by the session.
IP Protocol (proto) IP protocol associated with the session.
Action (action) Action taken for the session; possible values are:
• allow—session was allowed by policy
• deny—session was denied by policy
PAN-OS® Administrator’s Guide Version 10.2 676 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
676 | Monitoring
Field Name Description
GTP Event Type (event_type) Defines event triggered by a GTP message when checks in
GTP protection profile are applied to the GTP traffic. Also
triggered by the start or end of a GTP session.
MSISDN (msisdn) Service identity associated with the mobile subscriber
composed of a Country Code, National Destination Code
and a Subscriber. Consists of decimal digits (0-9) only with a
maximum of 15 digits.
Access Point Name (apn) Reference to a Packet Data Network Data Gateway (PGW)/
Gateway GPRS Support Node in a mobile network. Composed
of a mandatory APN Network Identifier and an optional APN
Operator Identifier.
Radio Access Technology
(rat)
Type of technology used for radio access. For example,
EUTRAN, WLAN, Virtual, HSPA Evolution, GAN and GERAN.
GTP Message Type
(msg_type)
Indicates the GTP message type.
End IP Address (end_ip_adr) IP address of a mobile subscriber allocated by a PGW/GGSN.
Tunnel Endpoint Identifier1
(teid1)
Identifies the GTP tunnel in the network node. TEID1 is the
first TEID in the GTP message.
Tunnel Endpoint Identifier2
(teid2)
Identifies the GTP tunnel in the network node. TEID2 is the
second TEID in the GTP message.
GTP Interface (gtp_interface) 3GPP interface from which a GTP message is received.
GTP Cause (cause_code) GTP cause value in logs responses which contain an
Information Element that provides information about
acceptance or rejection of GTP requests by a network node.
Severity (severity) Severity associated with the event; values are informational,
low, medium, high, critical.
Serving Network MCC (mcc) Mobile country code of serving core network operator.
Serving Network MNC (mnc) Mobile network code of serving core network operator.
Area Code (area_code) Area within a Public Land Mobile Network (PLMN).
Cell ID (cell_id) Base station within an area code.
PAN-OS® Administrator’s Guide Version 10.2 677 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
677 | Monitoring
Field Name Description
GTP Event Code
(event_code)
Event code describing the GTP event.
Source Location (srcloc) Source country or Internal region for private addresses;
maximum length is 32 bytes.
Destination Location (dstloc) Destination country or Internal region for private addresses;
maximum length is 32 bytes.
Tunnel ID/IMSI (imsi) International Mobile Subscriber Identity (IMSI) is a unique
number allocated to each mobile subscriber in the GSM/
UMTS/EPS system. IMSI shall consist of decimal digits (0
through 9) only and maximum number of digits allowed are 15.
Monitor Tag/IMEI (imei) International Mobile Equipment Identity (IMEI) is a unique 15
or 16 digit number allocated to each mobile station equipment.
Start Time (start) Time of session start.
Elapsed Time (elapsed) Elapsed time of the session.
Tunnel Inspection Rule
(tunnel_insp_rule)
Name of the tunnel inspection rule matching the cleartext
tunnel traffic
Remote User IP
(remote_user_ip)
IPv4 or IPv6 address used by a remote user.
Remote User ID
(remote_user_id)
IMSI identity of a remote user, and if available, one IMEI
identity and/or one MSISDN identity.
UUID for rule (rule_uuid) Universally Unique ID for rule.
PCAP ID (pcap_id) Unique packet capture ID that is used to locate the pcap file
saved on the firewall.
High Resolution Timestamp
(high_res_timestamp)
Time in milliseconds the log was received at the management
plane.
The format for this new field is YYYY-MM-DDThh:ss:sssTZD:
• YYYY—Four digit year
• MM—Two-digit month
• DD—Two-digit day of the month (01 through 31)
• T—Indicator for the beginning of the timestamp
• hh—Two-digit hour using 24-hour time (00 through 23)
• mm—Two-digit minute (00 through 59)
PAN-OS® Administrator’s Guide Version 10.2 678 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
678 | Monitoring
Field Name Description
• ss—Two-digit second (00 through 60)
• sss—One or more digits for millisecond
• TZD—Time zone designator (+hh:mm or -hh:mm)
The High Resolution Timestamp is supported
for logs received from managed firewalls
running PAN-OS 10.2 and later releases.
Logs received from managed firewalls running
PAN-OS 9.1 and earlier releases display a
1969-12-31T16:00:00:000-8:00
timestamp regardless of when the log was received.
A Slice Service Type
(nsdsai_sst)
The A Slice Service Type of the Network Slice ID.
A Slice Differentiator
(nsdsai_sd)
The A Slice Differentiator of the Network Slice ID.
Application Subcategory
(subcategory_of_app)
The application subcategory specified in the application
configuration properties.
Application Category
(category_of_app)
The application category specified in the application
configuration properties. Values are:
• business-systems
• collaboration
• general-internet
• media
• networking
• saas
Application Technology
(technology_of_app)
The application technology specified in the application
configuration properties. Values are:
• browser-based
• client-server
• network-protocol
• peer-to-peer
Application Risk (risk_of_app) Risk level associated with the application (1=lowest to
5=highest).
Application Characteristic
(characteristic_of_app)
Comma-separated list of applicable characteristic of the
application
PAN-OS® Administrator’s Guide Version 10.2 679 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
679 | Monitoring
Field Name Description
Application Container
(container_of_app)
The parent application for an application.
Application SaaS
(is_saas_of_app)
Displays 1 if a SaaS application or 0 if not a SaaS application.
Application Sanctioned State
(sanctioned_state_of_app)
Displays 1 if application is sanctioned or 0 if application is not
sanctioned.
Application Subcategory
(subcategory_of_app)
The application subcategory specified in the application
configuration properties.
Audit Log Fields
Where Can I Use This? What Do I Need?
• Next-Gen Firewall
• Panorama™ management server
Support license
(Panorama) Device management license
Format: Serial Number, Generate Time, Threat/Content Type, FUTURE_USE, Event ID, Object,
CLI Command, Severity
Field Name Description
Serial Number Serial number of the firewall or Panorama that generated the log.
Generate Time Time the log was generated on the dataplane.
Threat/Content Type
(subtype)
Specifies the type of log; value is AUDIT.
Audit logs are a subytpe of System logs.
Event ID Source of the command that generated the audit log. Values include
the following as a source of the command:
• cli—Firewall or Panorama command line.
• gui—Navigation in the firewall or Panorama web interface.
• gui-op—Operational command from the firewall or Panorama
web interface.
• gnmi—OpenConfig plugin.
• rest—PAN-OS REST API.
PAN-OS® Administrator’s Guide Version 10.2 680 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
680 | Monitoring
Field Name Description
Object Name of the administrator which executed the command that
generated the log.
CLI Command Command executed that generated the log.
Severity Completion status for the command that generated the log; value
can be none, success, or failure.
Syslog Severity
The syslog severity is set based on the log type and contents.
Log Type/Severity Syslog Severity
Traffic Info
Config Info
Threat/System—
Informational
Info
Threat/System—Low Notice
Threat/System—Medium Warning
Threat/System—High Warning
Threat/System—Critical Critical
Custom Log/Event Format
To facilitate the integration with external log parsing systems, the firewall allows you to customize
the log format; it also allows you to add custom Key: Value attribute pairs. Custom message
formats can be configured under Device > Server Profiles > Syslog > Syslog Server Profile >
Custom Log Format.
To achieve ArcSight Common Event Format (CEF) compliant log formatting, refer to the CEF
Configuration Guide.
Escape Sequences
Any field that contains a comma or a double-quote is enclosed in double quotes. Furthermore, if
a double-quote appears inside a field it is escaped by preceding it with another double-quote. To
maintain backward compatibility, the Misc field in threat log is always enclosed in double-quotes.
PAN-OS® Administrator’s Guide Version 10.2 681 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
681 | Monitoring
SNMP Monitoring and Traps
The following topics describe how Palo Alto Networks firewalls, Panorama, and WF-500
appliances implement SNMP, and the procedures to configure SNMP monitoring and trap
delivery.
• SNMP Support
• Use an SNMP Manager to Explore MIBs and Objects
• Enable SNMP Services for Firewall-Secured Network Elements
• Monitor Statistics Using SNMP
• Forward Traps to an SNMP Manager
• Supported MIBs
SNMP Support
You can use an SNMP manager to monitor event-driven alerts and operational statistics for the
firewall, Panorama, or WF-500 appliance and for the traffic they process. The statistics and traps
can help you identify resource limitations, system changes or failures, and malware attacks. You
configure alerts by forwarding log data as traps, and enable the delivery of statistics in response
to GET messages (requests) from your SNMP manager. Each trap and statistic has an object
identifier (OID). Related OIDs are organized hierarchically within the Management Information
Bases (MIBs) that you load into the SNMP manager to enable monitoring.
When an event triggers SNMP trap generation (for example, an interface goes down),
the firewall, Panorama virtual appliance, M-Series appliance, and WF-500 appliance
respond by updating the corresponding SNMP object (for example, the interfaces MIB)
instead of waiting for the periodic update of all objects that occurs every ten seconds. This
ensures that your SNMP manager displays the latest information when polling an object
to confirm an event.
The firewall, Panorama, and WF-500 appliance support SNMP Version 2c and Version 3. Decide
which to use based on the version that other devices in your network support and on your
network security requirements. SNMPv3 is more secure and enables more granular access control
for system statistics than SNMPv2c. The following table summarizes the security features of each
version. You select the version and configure the security features when you Monitor Statistics
Using SNMP and Forward Traps to an SNMP Manager.
SNMPVersion Authentication Message Privacy MessageIntegrity MIB Access Granularity
SNMPv2cCommunity string No (cleartext) No SNMP community access for all
MIBs on a device
SNMPv3 EngineID, username,
and authentication
password (SHA
Privacy
password for
AES (128,
192, or 256)
encryption
Yes User access based on views that
include or exclude specific OIDs
PAN-OS® Administrator’s Guide Version 10.2 682 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
682 | Monitoring
SNMPVersion Authentication Message Privacy MessageIntegrity MIB Access Granularity
hashing for the
password)
of SNMP
messages
SNMP Implementation illustrates a deployment in which firewalls forward traps to an SNMP
manager while also forwarding logs to Log Collectors. Alternatively, you could configure the Log
Collectors to forward the firewall traps to the SNMP manager. For details on these deployments,
refer to Log Forwarding Options in Centralized Logging and Reporting. In all deployments, the
SNMP manager gets statistics directly from the firewall, Panorama, or WF-500 appliance. In this
example, a single SNMP manager collects both traps and statistics, though you can use separate
managers for these functions if that better suits your network.
Figure 2: SNMP Implementation
Use an SNMP Manager to Explore MIBs and Objects
To use SNMP for monitoring Palo Alto Networks firewalls, Panorama, or WF-500 appliances,
you must first load the Supported MIBs into your SNMP manager and determine which object
identifiers (OIDs) correspond to the system statistics and traps you want to monitor. The
following topics provide an overview of how to find OIDs and MIBs in an SNMP manager. For the
specific steps to perform these tasks, refer to your SNMP management software.
• Identify a MIB Containing a Known OID
PAN-OS® Administrator’s Guide Version 10.2 683 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
683 | Monitoring
• Walk a MIB
• Identify the OID for a System Statistic or Trap
Identify a MIB Containing a Known OID
If you already know the OID for a particular SNMP object (statistic or trap) and want to know
the OIDs of similar objects so you can monitor them, you can explore the MIB that contains the
known OID.
STEP 1 | Load all the Supported MIBs into your SNMP manager.
STEP 2 | Search the entire MIB tree for the known OID. The search result displays the MIB path for
the OID, as well as information about the OID (for example, name, status, and description).
You can then select other OIDs in the same MIB to see information about them.
STEP 3 | (Optional) Walk a MIB to display all its objects.
Walk a MIB
If you want to see which SNMP objects (system statistics and traps) are available for monitoring,
displaying all the objects of a particular MIB can be useful. To do this, load the Supported
MIBs into your SNMP manager and perform a walk on the desired MIB. To list the traps
that Palo Alto Networks firewalls, Panorama, and WF-500 appliance support, walk the
panCommonEventEventsV2 MIB. In the following example, walking the PAN-COMMON-MIB.my
displays the following list of OIDs and their values for certain statistics:
PAN-OS® Administrator’s Guide Version 10.2 684 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
684 | Monitoring
Identify the OID for a System Statistic or Trap
To use an SNMP manager for monitoring Palo Alto Networks firewalls, Panorama, or WF-500
appliances, you must know the OIDs of the system statistics and traps you want to monitor.
STEP 1 | Review the Supported MIBs to determine which one contains the type of statistic you want.
For example, the PAN-COMMON-MIB.my contains hardware version information. The
panCommonEventEventsV2 MIB contains all the traps that Palo Alto Networks firewalls,
Panorama, and WF-500 appliances support.
STEP 2 | Open the MIB in a text editor and perform a keyword search. For example, using Hardware
version as a search string in PAN-COMMON-MIB identifies the panSysHwVersion object:
panSysHwVersion OBJECT-TYPE
SYNTAX DisplayString (SIZE(0..128))
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Hardware version of the unit."
::= {panSys 2}
PAN-OS® Administrator’s Guide Version 10.2 685 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
685 | Monitoring
STEP 3 | In a MIB browser, search the MIB tree for the identified object name to display its OID. For
example, the panSysHwVersion object has an OID of 1.3.6.1.4.1.25461.2.1.2.1.2.
Enable SNMP Services for Firewall-Secured Network Elements
If you will use Simple Network Management Protocol (SNMP) to monitor or manage network
elements (for example, switches and routers) that are within the security zones of Palo Alto
Networks firewalls, you must create a security rule that allows SNMP services for those elements.
You don’t need a security rule to enable SNMP monitoring of Palo Alto Networks firewalls,
Panorama, or WF-500 appliances. For details, see Monitor Statistics Using SNMP.
STEP 1 | Create an application group.
1. Select Objects > Application Group and click Add.
2. Enter a Name to identify the application group.
3. Click Add, type snmp, and select snmp and snmp-trap from the drop-down.
4. Click OK to save the application group.
STEP 2 | Create a security rule to allow SNMP services.
1. Select Policies > Security and click Add.
2. In the General tab, enter a Name for the rule.
3. In the Source and Destination tabs, click Add and enter a Source Zone and a Destination
Zone for the traffic.
4. In the Applications tab, click Add, type the name of the applications group you just
created, and select it from the drop-down.
5. In the Actions tab, verify that the Action is set to Allow, and then click OK and Commit.
Monitor Statistics Using SNMP
The statistics that a Simple Network Management Protocol (SNMP) manager collects from
Palo Alto Networks firewalls can help you gauge the health of your network (systems and
PAN-OS® Administrator’s Guide Version 10.2 686 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
686 | Monitoring
connections), identify resource limitations, and monitor traffic or processing loads. The statistics
include information such as interface states (up or down), active user sessions, concurrent
sessions, session utilization, temperature, and system uptime.
You can’t configure an SNMP manager to control Palo Alto Networks firewalls (using SET
messages), only to collect statistics from them (using GET messages). For details on how
SNMP is implemented for Palo Alto Networks firewalls, see SNMP Support.
STEP 1 | Configure the SNMP Manager to get statistics from firewalls.
The following steps provide an overview of the tasks you perform on the SNMP manager. For
the specific steps, refer to the documentation of your SNMP manager.
1. To enable the SNMP manager to interpret firewall statistics, load the Supported MIBs for
Palo Alto Networks firewalls and, if necessary, compile them.
2. For each firewall that the SNMP manager will monitor, define the connection settings (IP
address and port) and authentication settings (SNMPv2c community string or SNMPv3
EngineID/username/password) for the firewall.
All Palo Alto Networks firewalls use port 161.
The SNMP manager can use the same or different connection and authentication
settings for multiple firewalls. The settings must match those you define when you
configure SNMP on the firewall (see Step 3). For example, if you use SNMPv2c, the
community string you define when configuring the firewall must match the community
string you define in the SNMP manager for that firewall.
3. Determine the object identifiers (OIDs) of the statistics you want to monitor. For
example, to monitor the session utilization percentage of a firewall, a MIB browser
shows that this statistic corresponds to OID 1.3.6.1.4.1.25461.2.1.2.3.1.0 in PANCOMMON-MIB.my. For details, see Use an SNMP Manager to Explore MIBs and
Objects.
4. Configure the SNMP manager to monitor the desired OIDs.
STEP 2 | Enable SNMP traffic on a firewall interface.
This is the interface that will receive statistics requests from the SNMP manager.
PAN-OS doesn’t synchronize management (MGT) interface settings for firewalls in a
high availability (HA) configuration. You must configure the interface for each HA peer.
Perform this step in the firewall web interface.
• To enable SNMP traffic on the MGT interface, select Device > Setup > Interfaces, edit the
Management interface, select SNMP, and then click OK and Commit.
• To enable SNMP traffic on any other interface, create an interface management profile for
SNMP services and assign the profile to the interface that will receive the SNMP requests.
The interface type must be Layer 3 Ethernet.
PAN-OS® Administrator’s Guide Version 10.2 687 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
687 | Monitoring
STEP 3 | Configure the firewall to respond to statistics requests from an SNMP manager.
PAN-OS doesn’t synchronize SNMP response settings for firewalls in a high availability
(HA) configuration. You must configure these settings for each HA peer.
1. Select Device > Setup > Operations and, in the Miscellaneous section, click SNMP
Setup.
2. Select the SNMP Version and configure the authentication values as follows. For version
details, see SNMP Support.
• V2c—Enter the SNMP Community String, which identifies a community of SNMP
managers and monitored devices, and serves as a password to authenticate the
community members to each other.
As a best practice, don’t use the default community string public; it’s well
known and therefore not secure.
• V3—Create at least one SNMP view group and one user. User accounts and views
provide authentication, privacy, and access control when firewalls forward traps and
SNMP managers get firewall statistics.
• Views—Each view is a paired OID and bitwise mask: the OID specifies a MIB and
the mask (in hexadecimal format) specifies which objects are accessible within
(include matching) or outside (exclude matching) that MIB. Click Add in the first
list and enter a Name for the group of views. For each view in the group, click Add
and configure the view Name, OID, matching Option (include or exclude), and
Mask.
• Users—Click Add in the second list, enter a username under Users, select the View
group from the drop-down, enter the authentication password (Auth Password)
used to authenticate to the SNMP manager, and enter the privacy password (Priv
Password) used to encrypt SNMP messages to the SNMP manager.
3. Click OK and Commit.
STEP 4 | Monitor the firewall statistics in an SNMP manager.
Refer to the documentation of your SNMP manager for details.
When monitoring statistics related to firewall interfaces, you must match the interface
indexes in the SNMP manager with interface names in the firewall web interface.
For details, see Firewall Interface Identifiers in SNMP Managers and NetFlow
Collectors.
Forward Traps to an SNMP Manager
Simple Network Management Protocol (SNMP) traps can alert you to system events (failures
or changes in hardware or software of Palo Alto Networks firewalls) or to threats (traffic that
matches a firewall security rule) that require immediate attention.
PAN-OS® Administrator’s Guide Version 10.2 688 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
688 | Monitoring
To see the list of traps that Palo Alto Networks firewalls support, use your SNMP Manager
to access the panCommonEventEventsV2 MIB. For details, see Use an SNMP Manager
to Explore MIBs and Objects.
For details on how for Palo Alto Networks firewalls implement SNMP, see SNMP Support.
STEP 1 | Enable the SNMP manager to interpret the traps it receives.
Load the Supported MIBs for Palo Alto Networks firewalls and, if necessary, compile them. For
the specific steps, refer to the documentation of your SNMP manager.
STEP 2 | Configure an SNMP Trap server profile.
The profile defines how the firewall accesses the SNMP managers (trap servers). You can
define up to four SNMP managers for each profile.
Optionally, configure separate SNMP Trap server profiles for different log types,
severity levels, and WildFire verdicts.
1. Log in to the firewall web interface.
2. Select Device > Server Profiles > SNMP Trap.
3. Click Add and enter a Name for the profile.
4. If the firewall has more than one virtual system (vsys), select the Location (vsys or
Shared) where this profile is available.
5. Select the SNMP Version and configure the authentication values as follows. For version
details, see SNMP Support.
• V2c—For each server, click Add and enter the server Name, IP address (SNMP
Manager), and Community String. The community string identifies a community of
SNMP managers and monitored devices, and serves as a password to authenticate
the community members to each other.
As a best practice, don’t use the default community string public; it’s well
known and therefore not secure.
• V3—For each server, click Add and enter the server Name, IP address (SNMP
Manager), SNMP User account (this must match a username defined in the SNMP
manager), EngineID used to uniquely identify the firewall (you can leave the field
blank to use the firewall serial number), authentication password (Auth Password)
used to authenticate to the server, and privacy password (Priv Password) used to
encrypt SNMP messages to the server.
6. Click OK to save the server profile.
PAN-OS® Administrator’s Guide Version 10.2 689 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
689 | Monitoring
STEP 3 | Configure log forwarding.
1. Configure the destinations of Traffic, Threat, and WildFire traps:
1. Create a Log Forwarding profile. For each log type and each severity level or WildFire
verdict, select the SNMP Trap server profile.
2. Assign the Log Forwarding profile to policy rules and network zones. The rules and
zones will trigger trap generation and forwarding.
2. Configure the destinations for System, Configuration, User-ID, HIP Match, and
Correlation logs. For each log (trap) type and severity level, select the SNMP Trap server
profile.
3. Click Commit.
STEP 4 | Monitor the traps in an SNMP manager.
Refer to the documentation of your SNMP manager.
When monitoring traps related to firewall interfaces, you must match the interface
indexes in the SNMP manager with interface names in the firewall web interface.
For details, see Firewall Interface Identifiers in SNMP Managers and NetFlow
Collectors.
Supported MIBs
The following table lists the Simple Network Management Protocol (SNMP) management
information bases (MIBs) that Palo Alto Networks firewalls, Panorama, and WF-500 appliances
support. You must load these MIBs into your SNMP manager to monitor the objects (system
statistics and traps) that are defined in the MIBs. For details, see Use an SNMP Manager to
Explore MIBs and Objects.
MIB Type Supported MIBs
Standard—The Internet
Engineering Task Force
(IETF) maintains most
standard MIBs. You can
download the MIBs from
the IETF website.
MIB-II
IF-MIB
HOST-RESOURCES-MIB
ENTITY-MIB
ENTITY-SENSOR-MIB
ENTITY-STATE-MIB
PAN-OS® Administrator’s Guide Version 10.2 690 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
690 | Monitoring
MIB Type Supported MIBs
Palo Alto
Networks
firewalls,
Panorama,
and WF-500
appliances
don’t support
every object
(OID) in every
one of these
MIBs. See the
Supported
MIBs links for
an overview of
the supported
OIDs.
IEEE 802.3 LAG MIB
LLDP-V2-MIB.my
BFD-STD-MIB
Enterprise—You can
download the enterprise
MIBs from the Palo Alto
Networks Technical
Documentation portal.
PAN-COMMON-MIB.my
PAN-GLOBAL-REG-MIB.my
PAN-GLOBAL-TC-MIB.my
PAN-LC-MIB.my
PAN-PRODUCT-MIB.my
PAN-ENTITY-EXT-MIB.my
PAN-TRAPS.my
MIB-II
MIB-II provides object identifiers (OIDs) for network management protocols in TCP/IP-based
networks. Use this MIB to monitor general information about systems and interfaces. For
example, you can analyze trends in bandwidth usage by interface type (ifType object) to
determine if the firewall needs more interfaces of that type to accommodate spikes in traffic
volume.
Palo Alto Networks firewalls, Panorama, and WF-500 appliances support only the following
object groups:
Object Group Description
system Provides system information such as the hardware model, system
uptime, FQDN, and physical location.
interfaces Provides statistics for physical and logical interfaces such as type,
current bandwidth (speed), operational status (for example, up or
down), and discarded packets. Logical interface support includes VPN
PAN-OS® Administrator’s Guide Version 10.2 691 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.