Details for Network Firewall Logs
Logging details for Network Firewall logs. Three types of customer logs are available: threat, traffic, and tunnel inspect logs.
Resources
- NGFW
Log Categories
API value (ID): | Console (Display Name) | Description |
---|---|---|
threat-log | Threat Log | Provides details on received firewall threats. |
traffic-log | Traffic Log | Provides details on traffic passing through the firewall. |
tunnellog | Tunnel Inspection Log | Provides details on received firewall tunnel inspect logs. |
Availability
Network Firewall logging is available in all the regions of the commercial realms.
Comments
Threat, traffic, and tunnel inspect logs are available. Logs are emitted to customers based on a five minute interval from the dataplane. The dataplane also registers logs as they're received.
Contents of a Network Firewall Threat Log
Property | Description |
---|---|
datetime | Timestamp when the log was received. |
action |
Action taken for the session. Values are, allow, deny, drop.
|
device_name | The hostname of the firewall on which the session was logged. |
direction |
Indicates the direction of the attack, whether client-to-server or server-to-client:
|
dst | Original session destination IP address. |
dstloc | Destination country or internal region for private addresses. Maximum length is 32 bytes. |
dstuser | User name of the user to which the session was destined. |
firewall-id | OCID of the firewall. |
proto | IP protocol associated with the session. |
receive_time | Time the log was received at the management plane. |
rule | Name of the rule that the session matched. |
sessionid | An internal numerical identifier applied to each session. |
severity | Severity associated with the threat. Values are informational, low, medium, high, and critical. |
src | Original session source IP address. |
srcloc | Source country or internal region for private addresses. Maximum length is 32 bytes. |
srcuser | User name of the user who started the session. |
subtype |
Subtype of threat log. Values include the following:
|
thr_category | Describes threat categories used to classify different types of threat signatures. |
threatid |
Palo Alto Networks identifier for the threat. A description string followed by a 64-bit numerical identifier in parentheses for some subtypes:
|
id | UUID of the log message. |
compartmentid | OCID of the compartment. |
ingestedtime | Timestamp when log was received by the Logging service. |
loggroupid | OCID of the log group. |
logid | OCID of the log object. |
tenantid | OCID of the tenant. |
source | OCID of the firewall. |
specversion | The version of the CloudEvents specification which the event uses. Enables the interpretation of the context. |
time | Timestamp when log was written. |
type | Type of the logs. |
regionId | OCID of the firewall region. |
Example Network Firewall Threat Log
{
"datetime": 1684255949000,
"logContent": {
"data": {
"action": "reset-both",
"device_name": "<device_name>",
"direction": "server-to-client",
"dst": "192.0.1.168",
"dstloc": "192.0.0.10-192.0.0.11",
"dstuser": "no-value",
"firewall-id": "ocid1.networkfirewall.oc1.me-jeddah-1.<unique_ID>",
"proto": "tcp",
"receive_time": "2023/05/16 16:52:29",
"rule": "<rule_name>",
"sessionid": "11804",
"severity": "medium",
"src": "192.0.2.168",
"srcloc": "192.0.0.1-192.0.0.2",
"srcuser": "no-value",
"subtype": "vulnerability",
"thr_category": "code-execution",
"threatid": "Eicar File Detected"
},
"id": "<unique_ID>",
"oracle": {
"compartmentid": "ocid1.compartment.oc1..<unique_ID>",
"ingestedtime": "2023-05-16T16:56:27.373Z",
"loggroupid": "ocid1.loggroup.oc1.me-jeddah-1.<unique_ID>",
"logid": "ocid1.log.oc1.me-jeddah-1.<unique_ID>",
"tenantid": "ocid1.tenancy.oc1..<unique_ID>"
},
"source": "ocid1.networkfirewall.oc1.me-jeddah-1.<unique_ID>",
"specversion": "1.0",
"time": "2023-05-16T16:52:29.000Z",
"type": "com.oraclecloud.networkfirewall.threat"
},
"regionId": "me-jeddah-1"
}
Contents of a Network Firewall Traffic Log
Property | Description |
---|---|
datetime | Timestamp when log was received. |
action |
Action taken for the session. Possible values are:
|
bytes | Number of total bytes (transmit and receive) for the session. |
bytes_received | Number of bytes in the server-to-client direction of the session. |
bytes_sent | Number of bytes in the client-to-server direction of the session. |
chunks | Sum of SCTP chunks sent and received for an association. |
chunks_received | Number of SCTP chunks sent for an association. |
chunks_sent | Number of SCTP chunks received for an association. |
config_ver | Configuration version. |
device_name | The hostname of the firewall on which the session was logged. |
dport | Destination port used by the session. |
dst | Original session destination IP address. |
dstloc | Destination country or internal region for private addresses. Maximum length is 32 bytes. |
firewall-id | OCID of the firewall. |
packets | Number of total packets (transmit and receive) for the session. |
pkts_received | Number of server-to-client packets for the session. |
pkts_sent | Number of client-to-server packets for the session. |
proto | IP protocol associated with the session. |
receive_time | Time the log was received at the management plane. |
rule | Name of the rule that the session matched. |
rule_uuid | The UUID that permanently identifies the rule. |
serial | Serial number of the firewall that generated the log. |
sessionid | An internal numerical identifier applied to each session. |
sport | Source port used by the session. |
src | Original session source IP address. |
srcloc | Source country or internal region for private addresses. Maximum length is 32 bytes. |
time_received | Time the log was received at the management plane. |
id | UUID of the log message. |
compartmentid | OCID of the compartment. |
ingestedtime | Timestamp when log was received by the Logging service. |
loggroupid | OCID of the log group. |
logid | OCID of the log object. |
tenantid | OCID of the tenant. |
source | OCID of the firewall. |
specversion | The version of the CloudEvents specification which the event uses. Enables the interpretation of the context. |
time | Timestamp when the log was written. |
type | Type of the logs. |
regionId | OCID of the firewall region. |
Example Network Firewall Traffic Log
{
"datetime": 1684257454000,
"logContent": {
"data": {
"action": "allow",
"bytes": "6264",
"bytes_received": "4411",
"bytes_sent": "1853",
"chunks": "0",
"chunks_received": "0",
"chunks_sent": "0",
"config_ver": "2561",
"device_name": "<device_name>",
"dport": "<port_number>",
"dst": "192.0.1.168",
"dstloc": "192.0.0.1-192.0.0.2",
"firewall-id": "ocid1.networkfirewall.oc1.me-jeddah-1.<unique_ID>",
"packets": "28",
"pkts_received": "12",
"pkts_sent": "16",
"proto": "tcp",
"receive_time": "2023/05/16 17:17:34",
"rule": "<rule_name>",
"rule_uuid": "<rule_unique_ID>",
"serial": "<serial_number>",
"sessionid": "<session_ID>",
"sport": "<port_number>",
"src": "192.0.2.168",
"srcloc": "192.0.0.10-192.0.0.11",
"time_received": "2023/05/16 17:17:34"
},
"id": "<unique_ID>",
"oracle": {
"compartmentid": "ocid1.compartment.oc1..<unique_ID>",
"ingestedtime": "2023-05-16T17:17:58.493Z",
"loggroupid": "ocid1.loggroup.oc1.me-jeddah-1.<unique_ID>",
"logid": "ocid1.log.oc1.me-jeddah-1.<unique_ID>",
"tenantid": "ocid1.tenancy.oc1..<unique_ID>"
},
"source": "ocid1.networkfirewall.oc1.me-jeddah-1.<unique_ID>",
"specversion": "1.0",
"time": "2023-05-16T17:17:34.000Z",
"type": "com.oraclecloud.networkfirewall.traffic"
},
"regionId": "me-jeddah-1"
}
Contents of a Network Firewall Tunnel Inspect Log
Property | Description |
---|---|
src | Source IP address of packets in the session. |
dst | Destination IP address of packets in the session. |
receive_time | Month, day, and time the log was received at the management plane. |
rule | Name of the security policy rule in effect on the session. |
srcloc | Source country or internal region for private addresses. The maximum length is 32 bytes. |
dstloc | Destination country or internal region for private addresses. The maximum length is 32 bytes. |
sessionid | Session ID of the session being logged. |
proto | IP protocol associated with the session. |
action | Action taken for the session. The possible values are:
|
serial | Serial number of the firewall that generated the log. |
sport | Source port used by the session. |
dport | Destination port used by the session. |
device_name | The firewall hostname on which the session was logged. |
bytes | Number of bytes in the session. |
bytes_sent | Number of bytes in the client-to-server direction of the session. |
bytes_received | Number of bytes in the server-to-client direction of the session. |
packets | Number of total packets (send and receive) for the session. |
pkts_sent | Number of client-to-server packets for the session. |
pkts_received | Number of server-to-client packets for the session. |
app | Application identified for the session. |
tunnelid | Tunnel ID being inspected or the International Mobile Subscriber Identity (IMSI) ID of the mobile user. |
monitortag | Monitor name configured for the Tunnel Inspection policy rule or the International Mobile Equipment Identity (IMEI) ID of the mobile device. |
parent_session_id | Session ID in which the particular session is tunneled. Applies only to the inner tunnel (if two levels of tunneling) or inside content (if one level of tunneling). |
parent_start_time | Year/month/day hours:minutes:seconds that the parent tunnel session began. |
tunnel | The tunnel type, such as VXLAN. |
max_encap | Number of packets the firewall dropped because the packet exceeded the maximum number of encapsulation levels configured in the Tunnel Inspection policy rule (drops the packet if the maximum tunnel inspection level is exceeded). |
unknown_proto | Number of packets the firewall dropped because the packet contains an unknown protocol, as enabled in the Tunnel Inspection policy rule (drops the packet if the unknown protocol is inside the tunnel). |
strict_check | Number of packets the firewall dropped because the tunnel protocol header in the packet failed to comply with the RFC for the tunnel protocol, as enabled in the Tunnel Inspection policy rule (drops the packet if the tunnel protocol fails the strict header check). |
tunnel_fragment | Number of packets the firewall dropped because of fragmentation errors. |
tunnel_insp_rule | Name of the tunnel inspection rule matching the clear text tunnel traffic. |
Example Network Firewall Tunnel Inspect Log
{
"datetime": 1729056482000,
"logContent": {
"data": {
"action": "allow",
"app": "vxlan",
"bytes": "58385",
"bytes_received": "0",
"bytes_sent": "58385",
"device_name": "PA-VM",
"dport": "<destination_port>",
"dst": "<destination_IP>",
"dstloc": "10.0.0.0-10.255.255.255",
"firewall-id": "ocid1.networkfirewall.oc1.us-sanjose-1.<unique_ID>",
"max_encap": "0",
"monitortag": "<unique_ID>",
"packets": "31",
"parent_session_id": "0",
"parent_start_time": "no-value",
"pkts_received": "0",
"pkts_sent": "31",
"proto": "udp",
"receive_time": "2024/10/16 05:28:02",
"rule": "<rule_name>",
"serial": "<unique_ID>",
"sessionid": "10",
"sport": "0",
"src": "<source_IP>",
"srcloc": "10.0.0.0-10.255.255.255",
"strict_check": "0",
"tunnel": "tunnel",
"tunnel_fragment": "0",
"tunnel_insp_rule": "allow-tunnel-inspect-rule",
"tunnelid": "<unique_ID>",
"unknown_proto": "0"
},
"id": "<unique_ID>",
"oracle": {
"compartmentid": "ocid1.compartment.oc1..<unique_ID>",
"ingestedtime": "2024-10-16T05:29:28.543Z",
"loggroupid": "ocid1.loggroup.oc1.us-sanjose-1.<unique_ID>",
"logid": "ocid1.log.oc1.us-sanjose-1.<unique_ID>",
"tenantid": "ocid1.tenancy.oc1..<unique_ID>"
},
"source": "ocid1.networkfirewall.oc1.us-sanjose-1.<unique_ID>",
"specversion": "1.0",
"time": "2024-10-16T05:28:02.000Z",
"type": "com.oraclecloud.networkfirewall.tunnel"
},
"regionId": "us-sanjose-1"
}