PANW-IP-000045 - Palo Alto Networks security platform components, including sensors, event databases, and management consoles must integrate with a network-wide monitoring capability.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

An integrated, network-wide intrusion detection capability increases the ability to detect and prevent sophisticated distributed attacks based on access patterns and characteristics of access.

Integration is more than centralized logging and a centralized management console. The enclave's monitoring capability may include multiple sensors, IPS, sensor event databases, behavior-based monitoring devices, application-level content inspection systems, malicious code protection software, scanning tools, audit record monitoring software, and network monitoring software. Some tools may monitor external traffic while others monitor internal traffic at key boundaries.

These capabilities may be implemented using different devices and therefore can have different security policies and severity-level schema. This is valuable because content filtering, monitoring, and prevention can become a bottleneck on the network if not carefully configured.

Solution

To create a NetFlow Server Profile:
Go to Device >> Server Profiles >> NetFlow
Select Add.
In the 'NetFlow Server Profile' window, complete the required fields.
In the 'Name' field, enter the name of the NetFlow Server Profile.
In the 'Minutes' field, enter the number of minutes after which the NetFlow template is refreshed.
In the 'Packets' field, enter the number of packets after which the NetFlow template is refreshed.
In the 'Active Timeout' field, enter the frequency (in minutes) the device exports records.
Select the 'PAN-OS Field Types' check box to export 'App-ID' and 'User-ID' fields.
Select 'Add' to add a NetFlow collector.
In the 'Name' field, enter the name of the server.
In the 'NetFlow Server' field, enter the hostname or IP address of the server.
In the 'Port' field enter the port used by the NetFlow collector (default 2055).
Select 'OK'.

Assign the NetFlow server profile to the interfaces that carry the traffic to be analyzed. These steps assume that it is one of the Ethernet interfaces. The configuration is the same for Ethernet, VLAN, Loopback and Tunnel interfaces.
Go to Network >> Interfaces >> Ethernet
Select the interface that the traffic traverses.
In the 'Ethernet Interface' window, in the 'NetFlow Profile' field, select the configured NetFlow Profile.
Select 'OK'.
Commit changes by selecting 'Commit' in the upper-right corner of the screen. Select 'OK' when the confirmation dialog appears.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_PAN_Y22M04_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002656, Rule-ID|SV-207705r557390_rule, STIG-ID|PANW-IP-000045, STIG-Legacy|SV-77171, STIG-Legacy|V-62681, Vuln-ID|V-207705

Plugin: Palo_Alto

Control ID: 0d141afd5dae1f2f4c7330aaa0c62a8c880c961bf431e0e0a0d3a34a21e088b5