📊 Zone Protection Profile Log Analysis

1. Understanding Log Types

Zone Protection Profile events are recorded in the Threat Logs with specific subtypes:

These subtypes help in filtering and identifying specific protection events in the logs.

2. Enabling Detailed Logging

To ensure that all relevant Zone Protection events are logged, enable additional threat logging via CLI:

set system setting additional-threat-log on

This command allows the firewall to generate Threat logs for various packet-based attacks, including:

Note: This setting is available in PAN-OS 8.1.2 and later versions.

3. CLI Commands for Monitoring

Use the following CLI commands to monitor Zone Protection activities:

Replace <zone-name> with the actual name of the zone you wish to inspect.

4. GUI Navigation for Log Analysis

To view Zone Protection events in the GUI:

  1. Navigate to Monitor > Logs > Threat .
  2. Use the following filters to isolate specific events:
    • ( subtype eq 'flood' ) – For flood protection events.
    • ( subtype eq 'scan' ) – For reconnaissance protection events.
    • ( subtype eq 'packet' ) – For packet-based attack protection events.

These filters help in quickly identifying and analyzing relevant security events.

5. Best Practices

6. Additional Resources