Configuring DSMs
Juniper Infranet Controller
177
a
From the left pane, select
System > Log/Monitoring > Client Logs >
Settings
.
b
From the Select Events to Log section, select the events that you wish to log.
c
In the
Server name/IP
field, type the name or IP address of the syslog server.
Step 6
You are now ready to configure the log source in SIEM.
To configure SIEM to receive events from Juniper Networks Secure Access
device:
From the
Log Source Type
drop-down list box, select
Juniper Networks
Secure Access (SA) SSL VPN
.
For more information on configuring log sources, see the
Log Sources User Guide
.
For more information about your Juniper device, see your vendor documentation.
Juniper Infranet
Controller
A SIEM Juniper Networks Infranet Controller DSM accepts DHCP events using
syslog. SIEM records all relevant events from a Juniper Networks Infranet
Controller. Before you configure SIEM to integrate with a Juniper Networks Infranet
Controller, you must configure syslog within the server. For more information on
configuring your Juniper Networks Infranet Controller, consult your vendor
documentation.
After you configure syslog for your Juniper Infranet Controller, you are now ready
to configure the log source in SIEM.
To configure SIEM to receive events from your Juniper Networks Infranet
Controller:
From the
Log Source Type
drop-down list box, select
Juniper Networks
Infranet Controller
option.
For more information on configuring devices, see the
Log Sources User Guide
.
Juniper Networks
Firewall and VPN
A SIEM Juniper Networks Firewall and VPN DSM accepts firewall and VPN events
using UDP syslog. SIEM records all relevant firewall and VPN events.
NOTE
TCP syslog is not supported. You must use UDP syslog.
Before you configure SIEM to integrate with the Juniper Networks Firewall and
VPN device, you must:
Step 1
Log in to your Juniper Networks Firewall and VPN user interface.
Step 2
Select
Configuration > Report Settings > Syslog
.
Step 3
Select the
enable syslog messages
check box.
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......