Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1 Manual page 93

Configuring dsms
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1:
Table of Contents

Advertisement

Using Syslog
Format
Step 1
Step 2
Step 3
Step 4
Step 5
In the Server name/IP field, enter the name or IP address of the syslog server.
g
From the Facility drop-down list box, select the facility.
h
From the Filter drop-down list box, select WELF:WELF. Click Add and click
i
Save Changes.
You are now ready to configure the sensor device within the STRM interface. To
configure STRM to receive events from Juniper Networks Secure Access device,
select Juniper Networks Secure Access (SA) SSL VPN from the Sensor Device
Type drop-down list box.
For more information on configuring sensor devices, see the Managing Sensor
Devices Guide. For more information regarding your Juniper device, see your
vendor documentation.
To integrate a Juniper Networks Secure Access device with STRM using syslog:
Log in to your Juniper device administration interface:
https://10.xx.xx.xx/admin
Configure syslog server information for events:
From the left panel, select System > Log/Monitoring > Events > Settings.
a
From the Select Events to Log section, select the events that you wish to log.
b
In the Server name/IP field, enter the name or IP address of the syslog server.
c
Configure syslog server information for user access:
From the left panel, select System > Log/Monitoring > User Access >
a
Settings.
From the Select Events to Log section, select the events that you wish to log.
b
In the Server name/IP field, enter the name or IP address of the syslog server.
c
Configure syslog server information for administrator access:
From the left panel, select System > Log/Monitoring > Admin Access >
a
Settings.
From the Select Events to Log section, select the events that you wish to log.
b
In the Server name/IP field, enter the name or IP address of the syslog server.
c
Configure syslog server information for client logs:
From the left panel, select System > Log/Monitoring > Client Logs >
a
Settings.
From the Select Events to Log section, select the events that you wish to log.
b
In the Server name/IP field, enter the name or IP address of the syslog server.
c
You are now ready to configure the sensor device within the STRM interface. To
configure STRM to receive events from Juniper Networks Secure Access device,
Configuring DSMs Guide
Using Syslog Format
87

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents