Juniper Router - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1 Manual

Configuring dsms
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1:
Table of Contents

Advertisement

40
Step 1
Step 2
J
R
UNIPER
A STRM Juniper Router DSM accepts events using syslog. STRM records all valid
syslog events.The STRM Juniper Router DSM supports all Juniper devices
running JunOS. Before you configure STRM to integrate with a Juniper Router,
you must forward your syslog logs to your STRM system.
To configure the routing platform to log system messages to STRM:
Log into your Juniper platform using SSH.
Include the following syslog statements at the
[edit system]
syslog {
host (hostname) {
facility severity;
explicit-priority;
match "regular-expression";
}
source-address source-address;
}
}
Table 40-1
lists and describes the configuration setting variables to be entered in
the syslog statement.
Table 40-1 List of syslog Configuration Setting Variables
Parameter
Description
hostname
Specify the IP address or the fully-qualified hostname of your
STRM system.
Configuring DSMs Guide
OUTER
hierarchy level:
edit system

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents