diff --git a/interface-definitions/nat_cgnat.xml.in b/interface-definitions/nat_cgnat.xml.in
index fce5e655d..71f4d67b0 100644
--- a/interface-definitions/nat_cgnat.xml.in
+++ b/interface-definitions/nat_cgnat.xml.in
@@ -1,198 +1,204 @@
 <?xml version="1.0"?>
 <interfaceDefinition>
   <node name="nat">
     <children>
       <node name="cgnat" owner="${vyos_conf_scripts_dir}/nat_cgnat.py">
         <properties>
           <help>Carrier-grade NAT (CGNAT) parameters</help>
           <priority>221</priority>
         </properties>
         <children>
+          <leafNode name="log-allocation">
+            <properties>
+              <help>Log IP address and port allocation</help>
+              <valueless/>
+            </properties>
+          </leafNode>
           <node name="pool">
             <properties>
               <help>External and internal pool parameters</help>
             </properties>
             <children>
               <tagNode name="external">
                 <properties>
                   <help>External pool name</help>
                   <valueHelp>
                     <format>txt</format>
                     <description>External pool name</description>
                   </valueHelp>
                   <constraint>
                     #include <include/constraint/alpha-numeric-hyphen-underscore-dot.xml.i>
                   </constraint>
                   <constraintErrorMessage>Name of pool can only contain alpha-numeric letters, hyphen and underscores</constraintErrorMessage>
                 </properties>
                 <children>
                   <leafNode name="external-port-range">
                     <properties>
                       <help>Port range</help>
                       <valueHelp>
                         <format>range</format>
                         <description>Numbered port range (e.g., 1001-1005)</description>
                       </valueHelp>
                       <constraint>
                         <validator name="port-range"/>
                       </constraint>
                     </properties>
                     <defaultValue>1024-65535</defaultValue>
                   </leafNode>
                   <node name="per-user-limit">
                     <properties>
                       <help>Per user limits for the pool</help>
                     </properties>
                     <children>
                       <leafNode name="port">
                         <properties>
                           <help>Ports per user</help>
                           <valueHelp>
                             <format>u32:1-65535</format>
                             <description>Numeric IP port</description>
                           </valueHelp>
                           <constraint>
                             <validator name="numeric" argument="--range 1-65535"/>
                           </constraint>
                         </properties>
                         <defaultValue>2000</defaultValue>
                       </leafNode>
                     </children>
                   </node>
                   <tagNode name="range">
                     <properties>
                       <help>Range of IP addresses</help>
                       <valueHelp>
                         <format>ipv4net</format>
                         <description>IPv4 prefix</description>
                       </valueHelp>
                       <valueHelp>
                         <format>ipv4range</format>
                         <description>IPv4 address range</description>
                       </valueHelp>
                       <constraint>
                         <validator name="ipv4-prefix"/>
                         <validator name="ipv4-host"/>
                         <validator name="ipv4-range"/>
                       </constraint>
                     </properties>
                     <children>
                       <leafNode name="seq">
                         <properties>
                           <help>Sequence</help>
                           <valueHelp>
                             <format>u32:1-999999</format>
                             <description>Sequence number</description>
                           </valueHelp>
                           <constraint>
                             <validator name="numeric" argument="--range 1-999999"/>
                           </constraint>
                           <constraintErrorMessage>Sequence number must be between 1 and 999999</constraintErrorMessage>
                         </properties>
                       </leafNode>
                     </children>
                   </tagNode>
                 </children>
               </tagNode>
               <tagNode name="internal">
                 <properties>
                   <help>Internal pool name</help>
                   <valueHelp>
                     <format>txt</format>
                     <description>Internal pool name</description>
                   </valueHelp>
                   <constraint>
                     #include <include/constraint/alpha-numeric-hyphen-underscore-dot.xml.i>
                   </constraint>
                   <constraintErrorMessage>Name of pool can only contain alpha-numeric letters, hyphen and underscores</constraintErrorMessage>
                 </properties>
                 <children>
                   <leafNode name="range">
                     <properties>
                       <help>Range of IP addresses</help>
                       <valueHelp>
                         <format>ipv4net</format>
                         <description>IPv4 prefix</description>
                       </valueHelp>
                       <valueHelp>
                         <format>ipv4range</format>
                         <description>IPv4 address range</description>
                       </valueHelp>
                       <constraint>
                         <validator name="ipv4-prefix"/>
                         <validator name="ipv4-host"/>
                         <validator name="ipv4-range"/>
                       </constraint>
                       <multi/>
                     </properties>
                   </leafNode>
                 </children>
               </tagNode>
             </children>
           </node>
           <tagNode name="rule">
             <properties>
               <help>Rule</help>
               <valueHelp>
                 <format>u32:1-999999</format>
                 <description>Number for this CGNAT rule</description>
               </valueHelp>
               <constraint>
                 <validator name="numeric" argument="--range 1-999999"/>
               </constraint>
               <constraintErrorMessage>Rule number must be between 1 and 999999</constraintErrorMessage>
             </properties>
             <children>
               <node name="source">
                 <properties>
                   <help>Source parameters</help>
                 </properties>
                 <children>
                   <leafNode name="pool">
                     <properties>
                       <help>Source internal pool</help>
                       <completionHelp>
                         <path>nat cgnat pool internal</path>
                       </completionHelp>
                       <valueHelp>
                         <format>txt</format>
                         <description>Source internal pool name</description>
                       </valueHelp>
                       <constraint>
                         #include <include/constraint/alpha-numeric-hyphen-underscore-dot.xml.i>
                       </constraint>
                       <constraintErrorMessage>Name of pool can only contain alpha-numeric letters, hyphen and underscores</constraintErrorMessage>
                     </properties>
                   </leafNode>
                 </children>
               </node>
               <node name="translation">
                 <properties>
                   <help>Translation parameters</help>
                 </properties>
                 <children>
                   <leafNode name="pool">
                     <properties>
                       <help>Translation external pool</help>
                       <completionHelp>
                         <path>nat cgnat pool external</path>
                       </completionHelp>
                       <valueHelp>
                         <format>txt</format>
                         <description>Translation external pool name</description>
                       </valueHelp>
                       <constraint>
                         #include <include/constraint/alpha-numeric-hyphen-underscore-dot.xml.i>
                       </constraint>
                       <constraintErrorMessage>Name of pool can only contain alpha-numeric letters, hyphen and underscores</constraintErrorMessage>
                     </properties>
                   </leafNode>
                 </children>
               </node>
             </children>
           </tagNode>
         </children>
       </node>
     </children>
   </node>
 </interfaceDefinition>
diff --git a/src/conf_mode/nat_cgnat.py b/src/conf_mode/nat_cgnat.py
index 957b12c28..bd6855e8b 100755
--- a/src/conf_mode/nat_cgnat.py
+++ b/src/conf_mode/nat_cgnat.py
@@ -1,327 +1,357 @@
 #!/usr/bin/env python3
 #
 # Copyright (C) 2024 VyOS maintainers and contributors
 #
 # This program is free software; you can redistribute it and/or modify
 # it under the terms of the GNU General Public License version 2 or later as
 # published by the Free Software Foundation.
 #
 # This program is distributed in the hope that it will be useful,
 # but WITHOUT ANY WARRANTY; without even the implied warranty of
 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 # GNU General Public License for more details.
 #
 # You should have received a copy of the GNU General Public License
 # along with this program.  If not, see <http://www.gnu.org/licenses/>.
 
 import ipaddress
 import jmespath
+import logging
 import os
 
 from sys import exit
+from logging.handlers import SysLogHandler
 
 from vyos.config import Config
 from vyos.template import render
 from vyos.utils.process import cmd
 from vyos.utils.process import run
 from vyos import ConfigError
 from vyos import airbag
 
 airbag.enable()
 
 
 nftables_cgnat_config = '/run/nftables-cgnat.nft'
 
+# Logging
+logger = logging.getLogger('cgnat')
+logger.setLevel(logging.DEBUG)
+
+syslog_handler = SysLogHandler(address="/dev/log")
+syslog_handler.setLevel(logging.INFO)
+
+formatter = logging.Formatter('%(name)s: %(message)s')
+syslog_handler.setFormatter(formatter)
+
+logger.addHandler(syslog_handler)
+
 
 class IPOperations:
     def __init__(self, ip_prefix: str):
         self.ip_prefix = ip_prefix
         self.ip_network = ipaddress.ip_network(ip_prefix) if '/' in ip_prefix else None
 
     def get_ips_count(self) -> int:
         """Returns the number of IPs in a prefix or range.
 
         Example:
         % ip = IPOperations('192.0.2.0/30')
         % ip.get_ips_count()
         4
         % ip = IPOperations('192.0.2.0-192.0.2.2')
         % ip.get_ips_count()
         3
         """
         if '-' in self.ip_prefix:
             start_ip, end_ip = self.ip_prefix.split('-')
             start_ip = ipaddress.ip_address(start_ip)
             end_ip = ipaddress.ip_address(end_ip)
             return int(end_ip) - int(start_ip) + 1
         elif '/31' in self.ip_prefix:
             return 2
         elif '/32' in self.ip_prefix:
             return 1
         else:
             return sum(
                 1
                 for _ in [self.ip_network.network_address]
                 + list(self.ip_network.hosts())
                 + [self.ip_network.broadcast_address]
             )
 
     def convert_prefix_to_list_ips(self) -> list:
         """Converts a prefix or IP range to a list of IPs including the network and broadcast addresses.
 
         Example:
         % ip = IPOperations('192.0.2.0/30')
         % ip.convert_prefix_to_list_ips()
         ['192.0.2.0', '192.0.2.1', '192.0.2.2', '192.0.2.3']
         %
         % ip = IPOperations('192.0.0.1-192.0.2.5')
         % ip.convert_prefix_to_list_ips()
         ['192.0.2.1', '192.0.2.2', '192.0.2.3', '192.0.2.4', '192.0.2.5']
         """
         if '-' in self.ip_prefix:
             start_ip, end_ip = self.ip_prefix.split('-')
             start_ip = ipaddress.ip_address(start_ip)
             end_ip = ipaddress.ip_address(end_ip)
             return [
                 str(ipaddress.ip_address(ip))
                 for ip in range(int(start_ip), int(end_ip) + 1)
             ]
         elif '/31' in self.ip_prefix:
             return [
                 str(ip)
                 for ip in [
                     self.ip_network.network_address,
                     self.ip_network.broadcast_address,
                 ]
             ]
         elif '/32' in self.ip_prefix:
             return [str(self.ip_network.network_address)]
         else:
             return [
                 str(ip)
                 for ip in [self.ip_network.network_address]
                 + list(self.ip_network.hosts())
                 + [self.ip_network.broadcast_address]
             ]
 
 
 def generate_port_rules(
     external_hosts: list,
     internal_hosts: list,
     port_count: int,
     global_port_range: str = '1024-65535',
 ) -> list:
     """Generates list of nftables rules for the batch file."""
     rules = []
     proto_map_elements = []
     other_map_elements = []
     start_port, end_port = map(int, global_port_range.split('-'))
     total_possible_ports = (end_port - start_port) + 1
 
     # Calculate the required number of ports per host
     required_ports_per_host = port_count
 
     # Check if there are enough external addresses for all internal hosts
     if required_ports_per_host * len(internal_hosts) > total_possible_ports * len(
         external_hosts
     ):
         raise ConfigError("Not enough ports available for the specified parameters!")
 
     current_port = start_port
     current_external_index = 0
 
     for internal_host in internal_hosts:
         external_host = external_hosts[current_external_index]
         next_end_port = current_port + required_ports_per_host - 1
 
         # If the port range exceeds the end_port, move to the next external host
         while next_end_port > end_port:
             current_external_index = (current_external_index + 1) % len(external_hosts)
             external_host = external_hosts[current_external_index]
             current_port = start_port
             next_end_port = current_port + required_ports_per_host - 1
 
         # Ensure the same port is not assigned to the same external host
         if any(
             rule.endswith(f'{external_host}:{current_port}-{next_end_port}')
             for rule in rules
         ):
             raise ConfigError("Not enough ports available for the specified parameters")
 
         proto_map_elements.append(
             f'{internal_host} : {external_host} . {current_port}-{next_end_port}'
         )
         other_map_elements.append(f'{internal_host} : {external_host}')
 
         current_port = next_end_port + 1
         if current_port > end_port:
             current_port = start_port
             current_external_index += 1  # Move to the next external host
 
     return [proto_map_elements, other_map_elements]
 
 
 def get_config(config=None):
     if config:
         conf = config
     else:
         conf = Config()
 
     base = ['nat', 'cgnat']
     config = conf.get_config_dict(
         base,
         get_first_key=True,
         key_mangling=('-', '_'),
         no_tag_node_value_mangle=True,
         with_recursive_defaults=True,
     )
 
     return config
 
 
 def verify(config):
     # bail out early - looks like removal from running config
     if not config:
         return None
 
     if 'pool' not in config:
         raise ConfigError(f'Pool must be defined!')
     if 'rule' not in config:
         raise ConfigError(f'Rule must be defined!')
 
     for pool in ('external', 'internal'):
         if pool not in config['pool']:
             raise ConfigError(f'{pool} pool must be defined!')
         for pool_name, pool_config in config['pool'][pool].items():
             if 'range' not in pool_config:
                 raise ConfigError(
                     f'Range for "{pool} pool {pool_name}" must be defined!'
                 )
 
     external_pools_query = "keys(pool.external)"
     external_pools: list = jmespath.search(external_pools_query, config)
     internal_pools_query = "keys(pool.internal)"
     internal_pools: list = jmespath.search(internal_pools_query, config)
 
     used_external_pools = {}
     used_internal_pools = {}
     for rule, rule_config in config['rule'].items():
         if 'source' not in rule_config:
             raise ConfigError(f'Rule "{rule}" source pool must be defined!')
         if 'pool' not in rule_config['source']:
             raise ConfigError(f'Rule "{rule}" source pool must be defined!')
 
         if 'translation' not in rule_config:
             raise ConfigError(f'Rule "{rule}" translation pool must be defined!')
 
         # Check if pool exists
         internal_pool = rule_config['source']['pool']
         if internal_pool not in internal_pools:
             raise ConfigError(f'Internal pool "{internal_pool}" does not exist!')
         external_pool = rule_config['translation']['pool']
         if external_pool not in external_pools:
             raise ConfigError(f'External pool "{external_pool}" does not exist!')
 
         # Check pool duplication in different rules
         if external_pool in used_external_pools:
             raise ConfigError(
                 f'External pool "{external_pool}" is already used in rule '
                 f'{used_external_pools[external_pool]} and cannot be used in '
                 f'rule {rule}!'
             )
 
         if internal_pool in used_internal_pools:
             raise ConfigError(
                 f'Internal pool "{internal_pool}" is already used in rule '
                 f'{used_internal_pools[internal_pool]} and cannot be used in '
                 f'rule {rule}!'
             )
 
         used_external_pools[external_pool] = rule
         used_internal_pools[internal_pool] = rule
 
 
 def generate(config):
     if not config:
         return None
 
     proto_maps = []
     other_maps = []
 
     for rule, rule_config in config['rule'].items():
         ext_pool_name: str = rule_config['translation']['pool']
         int_pool_name: str = rule_config['source']['pool']
 
         # Sort the external ranges by sequence
         external_ranges: list = sorted(
             config['pool']['external'][ext_pool_name]['range'],
             key=lambda r: int(config['pool']['external'][ext_pool_name]['range'][r].get('seq', 999999))
         )
         internal_ranges: list = [range for range in config['pool']['internal'][int_pool_name]['range']]
         external_list_hosts_count = []
         external_list_hosts = []
         internal_list_hosts_count = []
         internal_list_hosts = []
 
         for ext_range in external_ranges:
             # External hosts count
             e_count = IPOperations(ext_range).get_ips_count()
             external_list_hosts_count.append(e_count)
             # External hosts list
             e_hosts = IPOperations(ext_range).convert_prefix_to_list_ips()
             external_list_hosts.extend(e_hosts)
 
         for int_range in internal_ranges:
             # Internal hosts count
             i_count = IPOperations(int_range).get_ips_count()
             internal_list_hosts_count.append(i_count)
             # Internal hosts list
             i_hosts = IPOperations(int_range).convert_prefix_to_list_ips()
             internal_list_hosts.extend(i_hosts)
 
         external_host_count = sum(external_list_hosts_count)
         internal_host_count = sum(internal_list_hosts_count)
         ports_per_user = int(
             jmespath.search(f'pool.external."{ext_pool_name}".per_user_limit.port', config)
         )
         external_port_range: str = jmespath.search(
             f'pool.external."{ext_pool_name}".external_port_range', config
         )
 
         rule_proto_maps, rule_other_maps = generate_port_rules(
             external_list_hosts, internal_list_hosts, ports_per_user, external_port_range
         )
 
         proto_maps.extend(rule_proto_maps)
         other_maps.extend(rule_other_maps)
 
     config['proto_map_elements'] = ', '.join(proto_maps)
     config['other_map_elements'] = ', '.join(other_maps)
 
     render(nftables_cgnat_config, 'firewall/nftables-cgnat.j2', config)
 
     # dry-run newly generated configuration
     tmp = run(f'nft --check --file {nftables_cgnat_config}')
     if tmp > 0:
         raise ConfigError('Configuration file errors encountered!')
 
 
 def apply(config):
     if not config:
         # Cleanup cgnat
         cmd('nft delete table ip cgnat')
         if os.path.isfile(nftables_cgnat_config):
             os.unlink(nftables_cgnat_config)
         return None
     cmd(f'nft --file {nftables_cgnat_config}')
 
+    # Logging allocations
+    if 'log_allocation' in config:
+        allocations = config['proto_map_elements']
+        allocations = allocations.split(',')
+        for allocation in allocations:
+            try:
+                # Split based on the delimiters used in the nft data format
+                internal_host, rest = allocation.split(' : ')
+                external_host, port_range = rest.split(' . ')
+                # Log the parsed data
+                logger.info(
+                    f"Internal host: {internal_host.lstrip()}, external host: {external_host}, Port range: {port_range}")
+            except ValueError as e:
+                # Log error message
+                logger.error(f"Error processing line '{allocation}': {e}")
+
 
 if __name__ == '__main__':
     try:
         c = get_config()
         verify(c)
         generate(c)
         apply(c)
     except ConfigError as e:
         print(e)
         exit(1)