Juniper Networks Junos OS
The Juniper Junos OS Platform DSM for JSA accepts events that use syslog, structured-data syslog, or PCAP (SRX Series only). JSA records all valid syslog or structured-data syslog events.
The Juniper Junos OS Platform DSM supports the following Juniper devices that are running Junos OS:
Juniper M Series Multiservice Edge Routing
Juniper MX Series Ethernet Services Router
Juniper T Series Core Platform
Juniper SRX Series Services Gateway
For information on configuring PCAP data that uses a Juniper Networks SRX Series appliance, see Configure the PCAP ProtocolThe Juniper SRX Series appliance supports forwarding of packet capture (PCAP) and syslog data to JSA..
For more information about structured-data syslog, see RFC 5424 at the Internet Engineering Task Force: http://www.ietf.org/
Before you configure JSA to integrate with a Juniper device, you must forward data to JSA using syslog or structured-data syslog.
- Log in to your Juniper platform command-line interface (CLI).
- Include the following syslog statements at the
set system
hierarchy level:[set system] syslog {host (hostname) {facility <severity>; explicit-priority; any any; authorization any; firewall any;
} source-address source-address; structured-data {brief;} }
The following table lists and describes the configuration setting variables to be entered in the syslog statement.
Parameter
Description
host
Type the IP address or the fully qualified host name of your JSA.
Facility
Define the severity of the messages that belong to the named facility with which it is paired. Valid severity levels are:
Any
None
Emergency
Alert
Critical
Error
Warning
Notice
Info
Messages with the specified severity level and higher are logged. The levels from emergency through info are in order from highest severity to lowest.
Source-address
Type a valid IP address configured on one of the router interfaces for system logging purposes.
The source-address is recorded as the source of the syslog message send to JSA. This IP address is specified in the host host name statement
set system syslog
hierarchy level; however, this is not for messages directed to the other routing engine, or to the TX Matrix platform in a routing matrix.structured-data
Inserts structured-data syslog into the data.
You can now configure the log source in JSA.
The following devices are auto discovered by JSA as a Juniper Junos OS Platform devices:
Juniper M Series Multiservice Edge Routing
Juniper MX Series Ethernet Services Router
Juniper SRX Series
Juniper EX Series Ethernet Switch
Juniper T Series Core Platform
Note Due to logging similarities for various devices in the Junos OS family, expected events might not be received by the correct log source type when your device is automatically discovered. Review the automatically created log source for your device and then adjust the configuration manually. You can add any missed log source type or remove any incorrectly added log source type.
Configuring JSA to Receive Events from a Juniper Junos OS Platform Device
You can manually configure JSA to receive events from a Juniper Junos OS Platform device
- From the Log Source Type list, select one of
the following options:
Juniper JunOS Platform
Juniper M-Series Multiservice Edge Routing
Juniper MX-Series Ethernet Services Router
Juniper SRX-series
Juniper T-Series Core Platform
For more information about your Juniper device, see your vendor documentation.
Configure the PCAP Protocol
The Juniper SRX Series appliance supports forwarding of packet capture (PCAP) and syslog data to JSA.
Syslog data is forwarded to JSA on port 514. The IP address and outgoing PCAP port number are configured on the Juniper Networks SRX Series appliance interface. The Juniper Networks SRX Series appliance must be configured in the following format to forward PCAP data:
<IP Address>:<Port>
Where,
<IP Address> is the IP address of JSA.
<Port> is the outgoing port address for the PCAP data.
For more information about Configuring Packet Capture, see your Juniper Networks Junos OS documentation.
You are now ready to configure the new Juniper Networks SRX Log Source with PCAP protocol in JSA.
Configuring a New Juniper Networks SRX Log Source with PCAP
The Juniper Networks SRX Series appliance is automatically discovered by JSA as a Juniper Junos OS Platform.
Depending on your operating system, expected events might not be received when the log source is automatically detected. You can manually configure the log source.
JSA detects the syslog data and adds the log source automatically. The PCAP data can be added to JSA as Juniper SRX Series Services Gateway log source by using the PCAP Syslog combination protocol. Adding the PCAP Syslog Combination protocol after JSA auto discovers the Junos OS syslog data adds a log source to your existing log source limit. Deleting the existing syslog entry, then adding the PCAP Syslog Combination protocol adds both syslog and PCAP data as single log source.
- Log in to JSA.
- Click the Admin tab.
- On the navigation menu, click Data Sources.
- Click the Log Sources icon.
- Click Add.
- From the Log Source Type list, select Juniper SRX-series Services Gateway.
- From the Protocol Configuration list, select PCAP Syslog Combination.
- Type the Log Source Identifier.
- Type the Incoming PCAP Port.
To configure the Incoming PCAP Port parameter in the log source, enter the outgoing port address for the PCAP data as configured on the Juniper Networks SRX Series appliance interface. .
- Click Save.
- Select the auto discovered syslog-only Junos OS log source for your Juniper Networks SRX Series appliance.
- Click Delete.
A delete log source confirmation window is displayed.
- Click Yes.
The Junos OS syslog log source is deleted from the Log Source list. The PCAP Syslog Combination protocol is now visible in your log source list.
- On the Admin tab, click Deploy Changes.
Juniper Networks Network and Security Manager
The Juniper Networks Network and Security Manager (NSM) DSM for JSA accepts Juniper Networks NSM and Juniper Networks Secure Service Gateway (SSG) logs. All Juniper SSG logs must be forwarded through Juniper NSM to JSA. All other Juniper devices logs can be forwarded directly to JSA.
For more information on advanced filtering of Juniper Networks NSM logs, see your Juniper Networks vendor documentation.
To integrate a Juniper Networks NSM device with JSA, you must complete the following tasks:
Configuring Juniper Networks NSM to Export Logs to Syslog
Juniper Networks NSM uses the syslog server to export qualified log entries to syslog.
Configuring the syslog settings for the management system defines only the syslog settings for the management system. It does not export logs from the individual devices. You can enable the management system to export logs to syslog.
- Log in to the Juniper Networks NSM user interface.
- From the Action Manager menu, select Action Parameters.
- Type the IP address for the syslog server that you want to send qualified logs.
- Type the syslog server facility for the syslog server to which you want to send qualified logs.
- From the Device Log Action Criteria node, select the Actions tab.
- Select Syslog Enable for Category, Severity, and Action.
You are now ready to configure the log source in JSA.
Configuring a Log Source for Juniper Networks NSM
You can configure a log source in JSA for Juniper Networks NSM.
- Log in to JSA.
- Click the Admin tab.
- On the navigation menu, click Data Sources.
- Click the Log Sources icon.
- Click Add.
- From the Log Source Type list, select Juniper Networks Network and Security Manager.
- From the Protocol Configuration list, select Juniper NSM.
- Configure the following values for the Juniper NSM protocol:
Table 1: Juniper NSM Protocol Parameters
Parameter
Description
Log Source Identifier
Type the IP address or host name for the log source.
The Log Source Identifier must be unique for the log source type.
IP
Type the IP address or host name of the Juniper Networks NSM server.
Inbound Port
Type the Inbound Port to which the Juniper Networks NSM sends communications. The valid range is 0 - 65536. The default is 514.
Redirection Listen Port
Type the port to which traffic is forwarded. The valid range is 0 - 65,536. The default is 516.
Use NSM Address for Log Source
Select this check box to use the Juniper NSM management server IP address instead of the log source IP address. By default, the check box is selected.
Note In the JSA interface, the Juniper NSM protocol configuration provides the option to use the Juniper Networks NSM IP address by selecting the Use NSM Address for Log Source check box. If you wish to change the configuration to use the originating IP address (clear the check box), you must log in to your JSA console, as a root user, and restart the Console (for an all-in-one system) or the Event Collector hosting the log sources (in a distributed environment) by using the shutdown -r now command.