In this lab, we will configure the Palo Alto firewall to forward system logs and traffic logs to an external Syslog server. This is a common requirement in enterprise environments for centralized logging, security auditing, and monitoring.
We’ll assume that a Syslog server (such as a Linux server with Syslog-ng or rsyslog) is running in the DMZ zone.
● How to configure the firewall to forward logs to an external Syslog server.
● How centralized logging supports auditing and monitoring.
● Why external logging is important for log retention and integration with SIEM tools.