Pulse Secure Pulse Connect Secure
The JSA DSM for Pulse Secure Pulse Connect Secure collects syslog and WebTrends Enhanced Log File (WELF) formatted events from Pulse Secure Pulse Connect Secure mobile VPN devices.
The following table describes the specifications for the Pulse Secure Pulse Connect Secure DSM:
Specification |
Value |
---|---|
Manufacturer |
Pulse Secure |
DSM name |
Pulse Secure Pulse Connect Secure |
RPM file name |
DSM-PulseSecurePulseConnectSecure- JSA_version-build_number.noarch.rpm |
Supported versions |
8.2R5 |
Protocol |
Syslog, TLS Syslog |
Event format |
Admin Authentication System Network Error |
Recorded event types |
All events |
Automatically discovered? |
Yes |
Includes identity? |
Yes |
Includes custom properties? |
Yes |
More information |
Pulse Secure website (https://www.pulsesecure.net) |
To integrate Pulse Secure Pulse Connect Secure with JSA, complete the following steps:
If automatic updates are not enabled, RPMs are available for download from the Juniper support website. Download and install the most recent version of the Pulse Secure Pulse Connect Secure DSM RPM on your JSA console.
Configure your Pulse Secure Pulse Connect Secure device to send WebTrends Enhanced Log File (WELF) formatted events to JSA.
Configure your Pulse Secure Pulse Connect Secure device to send syslog events to JSA.
If JSA does not automatically detect the log source, add a Pulse Secure Pulse Connect Secure log source on the JSA Console. The following tables describe the parameters that require specific values to collect Syslog events from Pulse Secure Pulse Connect Secure:
Table 2: Pulse Secure Pulse Connect Secure Syslog Log Source Parameters Parameter
Value
Log Source type
Pulse Secure Pulse Connect Secure
Protocol Configuration
Syslog
Log Source Identifier
Type a unique identifier for the log source.
Optional. To add a Pulse Secure Pulse Connect Secure log source to receive syslog events from network devices that support TLS Syslog event forwarding, configure the log source on the JSA console to use the TLS Syslog protocol.
The following table describes the parameters that require specific values to collect TLS Syslog events from Pulse Secure Pulse Connect Secure:
Table 3: Pulse Secure Pulse Connect Secure TLS Syslog Log Source Parameters Parameter
Value
Log Source type
Pulse Secure Pulse Connect Secure
Protocol Configuration
TLS Syslog
Log Source Identifier
Type a unique identifier for the log source.
TLS Protocols
Select the version of TLS that is installed on the client.