Check Point Firewall-1 - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1 Manual

Configuring dsms
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1:
Table of Contents

Advertisement

9
Integrating Check
Point FireWall-1
Using Syslog
Step 1
Step 2
Step 3
Step 4
C
P
HECK
OINT
You can configure STRM to integrate with a Check Point FireWall-1 device using
one of the following methods:
Integrating Check Point FireWall-1 Using Syslog
Integrating CheckPoint FireWall-1 Using OPSEC
Note: Depending on your Operating System, the procedures for the Check Point
FireWall-1 device may vary. The following procedures are based on the Check
Point SecurePlatform Operating system.
This section describes how to ensure that the STRM Check Point FireWall-1 DSMs
accepts FireWall-1 events using syslog.
Note: If Check Point SmartCenter is installed on Microsoft Windows, you must use
the
Integrating CheckPoint FireWall-1 Using OPSEC
Before you configure STRM to integrate with a Check Point FireWall-1 device:
Enter the following command to access the Check Point console as an expert
user:
expert
A password prompt appears.
Enter your expert console password. Press Enter.
Open the following file:
/etc/rc.d/rc3.d/S99local
Add the following lines:
$FWDIR/bin/fw log -ftn | /usr/bin/logger -p
<facility>.<priority> > /dev/null 2>&1 &
Where:
is a Syslog facility, for example,
<facility>
is a Syslog priority, for example,
<priority>
For example:
Configuring DSMs Guide
F
W
IRE
ALL
method.
.
local3
.
info
-1

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents