🔖 Palo Alto Networks: Auto-Tagging Configuration Guide

1. Introduction to Auto-Tagging

Auto-tagging allows the firewall or Panorama to automatically assign tags to policy objects when specific log events occur. This feature establishes IP address-to-tag or user-to-tag mappings, enabling dynamic policy enforcement without manual intervention.

For example, when the firewall generates a threat log, it can tag the source IP address or user with a specific tag. These tags can populate dynamic address groups or dynamic user groups, which are then referenced in security, authentication, or decryption policies.

2. Use Cases

3. Configuration Steps

  1. Create a Tag:
    • Navigate to Objects > Tags .
    • Click Add , enter a Name , and optionally assign a Color and Comments .
    • Click OK to save.
  2. Create a Log Forwarding Profile:
    • Go to Objects > Log Forwarding and click Add .
    • Enter a Name for the profile.
    • Under Match List , click Add to define log types and filters.
    • Specify the Log Type (e.g., Threat, URL) and set the Filter criteria.
    • Under Built-in Actions , select Add Tag and specify the tag created earlier.
    • Optionally, set a Timeout to remove the tag after a specified period.
    • Click OK to save the profile.
  3. Assign the Log Forwarding Profile to Security Policies:
    • Navigate to Policies > Security and select the desired policy rule.
    • Click the Actions tab.
    • Under Log Forwarding , select the profile created earlier.
    • Click OK to apply the changes.
  4. Configure Dynamic Address or User Groups:
    • For IP addresses: Go to Objects > Address Groups , click Add , and set the Type to Dynamic . Enter the tag in the Match field.
    • For users: Navigate to Objects > Dynamic User Groups , click Add , and enter the tag in the Match field.
  5. Implement Security Policies Using Dynamic Groups:
    • In Policies > Security , create or edit a rule.
    • Set the Source or Destination to the dynamic group created earlier.
    • Define other policy parameters as needed and click OK .
  6. Commit the Configuration:
    • Click Commit in the upper-right corner to apply all changes.

4. Additional Considerations (Continued)

By adhering to these additional considerations, administrators can effectively utilize auto-tagging to enhance the organization, clarity, and automation of their Palo Alto Networks firewall configurations.