/
Configuring Juniper Firewall

Use https://seceonhelp.freshdesk.com/support/login to access updated Knowledge Base Articles, Submit Technical Support Tickets and Review Status of submitted support tickets.

Configuring Juniper Firewall

Overview

In this document we are guiding with the steps to ingest Juniper Firewall SRX series with Seceon SIEM to have a Comprehensive visibility and Proactive Threat Detection in your Environment.

Configuring to send Syslog Messages

Using J-Web

  1. Log in to the Juniper SRX device.

  2. Click Configure > CLI Tools > Point and Click CLI in the Juniper SRX device.

  3. Expand System and click Syslog.

  4. In the Syslog page, click Add New Entry placed next to 'Host'.

  5. Enter the IP address of the remote Syslog server (CCE server IP) (i.e., Firewall Analyzer).

  6. Click Apply to save the configuration.

Using CLI

  1. Log in to the Juniper SRX device CLI console.

  2. Execute the following command:

user@host#  set system syslog host <IP address of the remote Syslog server (i.e., Firewall Analyzer)> any any

To enable logging for Security policy:

Using J-Web

  • Select Configure > Security > Policy > FW Policies.

  • Click on the policy for which you would like to enable logging.

  • Navigate to Logging/Count and in Log Options, select Log at Session Close Time.

Using CLI

  1. Log in to the Juniper SRX device CLI console.

  2. Execute the following command:

user@host# set security policies from-zone trust to-zone untrust policy permit-all then log session-close

Juniper Networks IDP Device (version IDP 50)

Configuring to send Syslog Messages directly from Sensor

  1. Log in to the Juniper Networks IDP device.

  2. Click Device > Report Settings > Enable Syslog in the Juniper Networks IDP device.

  3. Select the Enable Syslog Messages check box.

  4. Click Apply to save the changes.

This configuration will generate syslogs for:

  • All attacks

  • Policy load

  • Restart

This configuration will not provide:

  • Profiler logs

  • Device connect/disconnect logs

  • Interface UP/DOWN logs

  • Logs for Bypass State Changes 

Configuring to send Syslog Messages from NSM 

  1. Log in to NSM.

  2. Click Action Manager > Action Parameters > Define a Syslog Server in the NSM.

  3. Click Action Manager > Device Log Action Criteria > Category in the NSM.

  4. Select Category = all and Actions = syslog enable

  5. Click Apply to save the changes.

This configuration will generate syslogs for:

  • All attacks

  • Policy load

  • Restart

  • Profiler logs

  • Device connect/disconnect logs

This configuration will not provide:

  • Interface UP/DOWN logs

  • Logs for Bypass State Changes

 Verification

STEP1: Login to UI >> SYSTEM>> LOGS AND FLOWS COLLECTION STATUS .

STEP 2: >> LOGS AND FLOWS COLLECTION STATUS .

STEP 3: >>Inside SOURCE DEVICE IP, IP will reflect.

Related content

Configure NetFlow in Juniper Switches
Configure NetFlow in Juniper Switches
More like this
Palo Alto Firewall- Syslog Configuration
Palo Alto Firewall- Syslog Configuration
Read with this
Configure syslogs from Sophos firewall
Configure syslogs from Sophos firewall
More like this
Netflow configuration from Sophos firewall
Netflow configuration from Sophos firewall
Read with this
Configuring syslogs from Cisco ASA/ Cisco PIX through User Interface
Configuring syslogs from Cisco ASA/ Cisco PIX through User Interface
More like this
Configuring Syslog's and NetFlow's from Fortinet/ FortiGate firewalls
Configuring Syslog's and NetFlow's from Fortinet/ FortiGate firewalls
Read with this

Seceon Inc. All rights reserved. https://www.seceon.com