PAN-OS Operations Threat Prevention Dynamic Address Groups Log Forwarding / Tagging

From Log to Block: Auto-Blocking External Threat Sources with PAN-OS

A production pattern: tag external source IPs on meaningful denied threats, feed those tags into a Dynamic Address Group, and enforce a high-priority global block rule.

The problem

Internet-facing services attract constant hostile traffic. Even when traffic is denied, repeat offenders create noise and overhead: repeated sessions, repeated inspection, repeated log volume.

Goal: If an external source IP triggers a meaningful denied threat (medium/high), it should be blocked everywhere automatically — without external tooling and without manual list maintenance.

The design pattern

1) Log forwarding filter (Threat logs)

Create a log forwarding profile match list for Log Type: threat and filter for real, actionable abuse.

Threat log forwarding filter match list
Threat Log Forwarding profile match list tuned to catch meaningful denied threats from outside sources.

2) Tag the source IP (built-in tagging action)

The built-in action tags the Source Address (not a user, not a destination). The firewall observes an event and immediately turns it into an enforcement input.

Built-in tagging action targeting Source Address
Built-in tagging action: target = Source Address; action = Add Tag.

3) Dynamic Address Group (DAG)

Define a Dynamic Address Group that matches on the tag. As soon as the firewall registers the tag, that IP becomes a member of the DAG.

Dynamic Address Group matching on tag
Dynamic Address Group configured to match the tag.

4) Confirm it’s populating

Once tags start being applied, the DAG should fill quickly — especially if you’re protecting public IP space.

DAG populated with registered IPs
DAG populated with registered IPs (tagged sources).

5) High-priority block rule

Place a high-priority security rule near the top of the rulebase to drop traffic from the DAG to anything.

High-priority block rule using the DAG as source
High-priority block policy: Source = DAG; Destination = any; Action = drop.

What this buys you

High deny volume demonstrating the value of auto-blocking
Example deny/log volume: this is the kind of flood this pattern cleans up fast.

Guardrails

This post describes an operational pattern (“how to think”). Implementation details should be tested safely in your environment.