Configuring DSMs
92
E
NTERASYS
To configure SIEM to receive events from the Enterasys HiPath Wireless
Controller device:
From the
Log Source Type
drop-down list box, select the
Enterasys HiPath
option.
For more information on configuring log sources, see the
Log Sources User Guide
.
For more information about your Enterasys HiPath Wireless Controller device, see
your vendor documentation.
Enterasys
Stackable and
Standalone
Switches
The Enterasys Stackable and Standalone Switches DSM accepts events using
syslog. SIEM records all relevant events. Before configuring an Enterasys
Stackable and Standalone Switches device in SIEM, you must configure your
device to send syslog events to SIEM.
To configure the device to send syslog events to SIEM:
Step 1
Log in to the Enterasys Stackable and Standalone Switch device.
Step 2
Type the following command:
set logging server <index> [ip-addr <IP address>] [facility
<facility>] [severity <severity>] [descr <description>] [port
<port>] [state <enable | disable>]
Where:
<index>
is the server table index number (1 to 8) for this server.
<ip address> is the IP address of the server you wish to send
syslog messages. This is an optional field.
If you do not define an IP
address, an entry in the Syslog server table is created with the specified index
number and a message is displayed indicating that no IP address has been
assigned.
<facility>
is a syslog facility. Valid values are
local0
to
local7
. This is an
optional field. If not specified, the default value configured with the set logging
default command is applied.
<severity>
is the server severity level that the server will log messages. The
valid range is 1 to 8. If not specified, the default value configured with the set
logging default command is applied. This is an optional field. Valid values include:
-
1: Emergencies (system is unusable)
-
2: Alerts (immediate action required)
-
3: Critical conditions
-
4: Error conditions
-
5: Warning conditions
-
6: Notifications (significant conditions)
-
7: Informational messages
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......