Check Point Provider-1 - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1 Manual

Configuring dsms
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1:
Table of Contents

Advertisement

10
Integrating Check
Point Provider-1
Using Syslog
Step 1
Step 2
Step 3
Step 4
Step 5
C
P
HECK
OINT
You can configure STRM to integrate with a Check Point Provider-1 device using
one of the following methods:
Integrating Check Point Provider-1 Using Syslog
Integrating Check Point Provider-1 Using OPSEC
Note: Depending on your Operating System, the procedures for the Check Point
Provider-1 device may vary. The following procedures are based on the Check
Point SecurePlatform Operating system.
This method ensures the STRM Check Point Provider-1 DSM accepts Check Point
Provider-1 events using syslog. STRM records all relevant Check Point Provider-1
events.
Before you configure STRM to integrate with a Check Point Provider-1 device, you
must:
Enter the following command to access the console as an expert user:
expert
A password prompt appears.
Enter your expert console password. Press Enter.
Enter the following command:
csh
Select the desired customer logs:
mdsenv <customer name>
Enter the following command:
# nohup $FWDIR/bin/fw log -ftn | /usr/bin/logger -p
<facility>.<priority> 2>&1 &
Where:
is a Syslog facility, for example, local3.
<facility>
is a Syslog priority, for example, info.
<priority>
Configuring DSMs Guide
P
ROVIDER
-1

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents