Configuring DSMs
256
N
ORTEL
N
ETWORKS
Configure the Log Source within SIEM
You are now ready to configure the log source in SIEM.
Step 1
To configure SIEM to receive events from a Nortel Switched Firewall 5100 device
using OPSEC, you must select the
Nortel Switched Firewall 5100
option from the
Log Source Type
drop-down list box.
Step 2
To configure SIEM to receive events from a Check Point SmartCenter Server using
OPSEC LEA, you must select the
LEA
option from the
Protocol Configuration
drop-down list box when configuring your protocol configuration.
For more information, see the
Log Sources User Guide
.
Nortel Switched
Firewall 6000
A SIEM Nortel Switched Firewall 6000 DSM accepts events using either syslog or
OPSEC. SIEM records all relevant events. Before configuring a Nortel Switched
Firewall device in SIEM, you must configure your device to send events to SIEM.
This section provides information on configuring a Nortel Switched Firewall 6000
device with SIEM using one of the following methods:
•
Integrating Nortel Switched Firewall Using Syslog
•
Integrating Nortel Switched Firewall Using OPSEC
Integrating Nortel
Switched Firewall
Using Syslog
This method ensures the SIEM Nortel Switched Firewall 6000 DSM accepts events
using syslog. Before you configure SIEM to integrate with a Nortel Switched
Firewall 6000 DSM, you must:
Step 1
Log into your Nortel Switched Firewall device command line interface (CLI).
Step 2
Type the following command:
/cfg/sys/log/syslog/add
Step 3
Type the IP address of your SIEM system at the following prompt:
Enter IP address of syslog server:
A prompt is displayed to configure the severity level.
Step 4
Configure
info
as the desired severity level. For example:
Enter minimum logging severity
(emerg | alert | crit | err | warning | notice | info | debug):
info
A prompt is displayed to configure the facility.
Step 5
Configure
auto
as the local facility. For example:
Enter the local facility (auto | local0-local7): auto
Step 6
Apply the configuration:
apply
Step 7
You are now ready to configure the log source in SIEM.
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......