Juniper Security Threat Response Manager User manual

Type
User manual
Juniper Networks, Inc.
1194 North Mathilda Avenue
Sunnyvale, CA 94089
USA
408-745-2000
www.juniper.net
Part Number: 530-025608-01, Revision 1
Security Threat Response Manager
Configuring DSMs
Release 2008.2
2
Copyright Notice
Copyright © 2008 Juniper Networks, Inc. All rights reserved. Juniper Networks and the Juniper Networks logo are registered trademarks of Juniper
Networks Inc. in the United States and other countries. All other trademarks, service marks, registered trademarks, or registered service marks in this
document are the property of Juniper Networks or their respective owners. All specifications are subject to change without notice. Juniper Networks
assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves
the right to change, modify, transfer, or otherwise revise this publication without notice.
FCC Statement
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and
used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following
information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it
is not installed in accordance with NetScreen’s installation instructions, it may cause interference with radio and television reception. This equipment has
been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These
specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Consult the dealer or an experienced radio/TV
technician for help. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Caution: Changes or modifications to this product could void the user's warranty and authority to operate this device.
Disclaimer
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET
THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE
SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY.
Configuring DSMs
Release 2008.2
Copyright © 2008, Juniper Networks, Inc.
All rights reserved. Printed in USA.
Revision History
June 2008—Revision 1
The information in this document is current as of the date listed in the revision history.
1
1
About This Guide 1
3
Overview 3
5
3Com 8800 Series Switch 5
7
Ambiron TrustWave ipAngel 7
9
Apache HTTP Server 9
11
Apple Mac OS X 11
13
Array Network SSL VPN 13
15
F5 Networks BigIP 15
17
Blue Coat SG 17
19
Check Point FireWall-1 19
25
Check Point Provider-1 25
29
Cisco ACS 29
31
Cisco ASA 31
33
Cisco CatOS for Catalyst Switches 33
35
Cisco CSA 35
37
Cisco FWSM 37
39
Cisco IDS/IPS 39
41
Cisco NAC Device 41
43
Cisco IOS 43
45
Cisco Pix 45
47
Cisco VPN 3000 Concentrator 47
49
CyberGuard Firewall/VPN Appliance 49
51
2
Enterasys Dragon 51
55
Enterasys Matrix Router 55
57
Enterasys Matrix N-Series 57
59
Extreme Networks ExtremeWare 59
61
ForeScout CounterACT 61
63
Fortinet FortiGate 63
65
Generic Authorization Server 65
69
Generic Firewall 69
73
IBM AIX 5L 73
75
IBM Proventia Management SiteProtector 75
77
ISS Proventia 77
79
Juniper DX Application Acceleration Platform 79
81
Juniper EX-Series Ethernet Switch 81
83
Juniper NetScreen IDP 83
85
Juniper Networks Secure Access 85
89
Juniper Infranet Controller 89
91
Juniper NetScreen Firewall 91
93
Juniper NSM 93
95
Juniper Router 95
97
Juniper Steel-Belted RADUIS 97
99
Linux DHCP 99
101
Linux IPtables 101
103
Linux Login Messages 103
3
105
McAfee Intrushield 105
107
McAfee ePolicy Orchestrator 107
109
MetaInfo MetaIP 109
111
Microsoft Exchange Server 111
113
Microsoft DHCP Server 113
115
Microsoft IAS Server 115
117
Microsoft IIS 117
119
Microsoft SQL Server 119
121
Microsoft Windows Security Event Log 121
123
Niksun 123
125
Nokia Firewall 125
129
Nortel ARN 129
131
Nortel Application Switch 131
133
Nortel Contivity 5000 133
135
Nortel Contivity Firewall/VPN 135
137
Nortel Switched Firewall 5100 137
141
Nortel Switched Firewall 6000 141
145
Nortel VPN Gateway 145
147
OpenBSD 147
149
Open Source SNORT 149
151
Oracle Audit Records 151
155
Oracle DB Listener 155
159
4
ProFTPd 159
161
Samhain 161
165
Secure Computing Sidewinder 165
167
Sun Solaris 167
169
Sun Solaris DHCP 169
171
SonicWALL 171
173
Sun Solaris Sendmail 173
175
Sourcefire Intrusion Sensor 175
177
Squid Web Proxy 177
179
Symantec SGS 179
181
Symantec System Center 181
183
Symark PowerBroker 183
185
Tipping Point Intrusion Prevention System 185
187
TippingPoint X505/X506 Device 187
189
TopLayer 189
191
Trend Micro InterScan VirusWall 191
193
Tripwire 193
195
Universal DSM 195
207
Vericept Content 360 DSM 207
209
Supported DSMs 209
Configuring DSMs
ABOUT THIS GUIDE
The Configuring DSMs Guide provides you with information for configuring sensor
devices (DSMs) and integrating the DSMs with STRM or STRM Log Management.
Conventions Table 1 lists conventions that are used throughout this guide.
Technical
Documentation
You can access technical documentation, technical notes, and release notes
directly from the Juniper networks Support Web site at
http://
www.juniper.net/support/.
Documentation
Feedback
We encourage you to provide feedback, comments, and suggestions so that we
can improve the documentation. Send your comments to
techpubs-comments@juniper.net, or fill out the documentation feedback form at
http://www.juniper.net/techpubs/docbug/docbugreport.html. If you are using e-mail, be
sure to include the following information with your comments:
Document name
Document part number
Page number
Software release version
Table 1 Icons
Icon Type Description
Information note Information that describes important features or
instructions.
Caution Information that alerts you to potential loss of
data or potential damage to an application,
system, device, or network.
Warning Information that alerts you to potential personal
injury.
Configuring DSMs
2 ABOUT THIS GUIDE
Requesting
Support
Open a support case using the Case Management link at
http://www.juniper.net/support/ or call 1-888-314-JTAC (from the United States,
Canada, or Mexico) or 1-408-745-9500 (from elsewhere).
Configuring DSMs Guide
1
OVERVIEW
You can configure STRM or STRM Log Management to log and correlate events
received from external sources such as security equipment (for example,
firewalls), and network equipment (for example, switches and routers). Device
Support Modules (DSMs) allows you to integrate STRM or STRM Log
Management with these external devices. Unless otherwise noted, all references
to STRM refer to both STRM and STRM Log Management.
You can configure the Event Collector to collect security events from various types
of security devices in your network. The Event Collector gathers events from local
and remote devices. The Event Collector then normalizes and bundles the events
and sends the events to the Event Processor.
All events are correlated and security and policy offenses are created based on
correlation rules. These offenses are displayed is the Offense Manager. For more
information on the Offense Manager interface, see the STRM Users Guide.
Note: Before you configure STRM to collect security information from devices, you
must set-up your deployment, including off-site sources or targets, using the
deployment editor. For more information on the deployment editor, see the STRM
Administration Guide.
To configure STRM to receive events from devices, you must:
Step 1 Configure the device to send events to STRM.
Step 2 Configure STRM to receive events from specific devices. For more information,
see the Managing Sensor Devices Guide.
Configuring DSMs Guide
2
3COM 8800 SERIES SWITCH
A STRM 3Com 8800 Series Switch DSM accepts events using syslog. STRM
records all relevant status and network condition events. Before configuring a
3Com 8800 Series Switch device in STRM, you must configure your device to
send syslog events to STRM.
To configure the device to send syslog events to STRM:
Step 1 Log in to the 3Com 8800 Series Switch interface.
Step 2 Enable the information center.
info-center enable
Step 3 Configure the host with the IP address of your STRM system as the loghost, the
severity level threshold value as informational, and the output language to English.
info-center loghost <ip_address> facility <severity> language
english
Where:
<ip_address> is the IP address of your STRM system.
<severity> is the facility severity.
Step 4 Configure the ARP and IP information modules to log.
info-center source arp channel loghost log level informational
info-center source ip channel loghost log level informational
You are now ready to configure the sensor device within the STRM interface. To
configure STRM to receive events from a 3Com 8800 Series Switch, you must
select the 3Com 8800 Series Switch option from the Sensor Device Type
drop-down list box. For more information on configuring sensor devices, see the
Managing Sensor Devices Guide.
Configuring DSMs Guide
3
AMBIRON TRUSTWAVE ipANGEL
A STRM Ambiron TrustWave ipAngel DSM accepts events using syslog. STRM
records all Snort-based events from the ipAngel console.
Before you configure STRM to integrate with ipAngel, you must forward your cache
and access logs to your STRM system. For information on forwarding device logs
to STRM, see your vendor documentation.
You are now ready to configure the sensor device within the STRM interface. To
configure STRM to receive events from a ipAngle device, choose one of the
following options, depending on which version of STRM you are using:
Select ATW IpAngel from the Sensor Device Type drop-down list box.
Select Ambiron TrustWave ipAngel Intrusion Prevention System (IPS) from
the Sensor Device Type drop-down list box.
For more information on configuring sensor devices, see the Managing Sensor
Devices Guide.
Configuring DSMs Guide
4
APACHE HTTP SERVER
A STRM Apache HTTP Server DSM accepts Apache events using syslog. You can
integrate Apache versions 1.3 and above with STRM. STRM records all relevant
HTTP status events.
Note: The procedure in this section applies to Apache DSMs operating on a
Unix/Linux platforms only.
Before you configure STRM to integrate with Apache, you must:
Step 1 Open the Apache configuration file.
Step 2 Add the following below the log format definitions:
LogFormat "%h %A %l %u %t \"%r\" %>s %p %b" qradar
Step 3 Add the following line below the LogFormat entry to write to syslog:
CustomLog “|/usr/bin/logger -t httpd -p <facility>.<priority>” qradar
Where:
<facility> is a syslog facility, for example, local0.
<priority> is a syslog priority, for example, info or notice.
For example:
CustomLog “|/usr/bin/logger -t httpd -p local1.info” qradar
Note: Verify that the hostname lookups is disabled. To verify, enter
HostnameLookups off
Step 4 Open the syslog.conf file.
Step 5 Add the following line:
<facility>.<priority> <TAB><TAB>@<host>
Where:
<facility> is the syslog facility, for example, local0. This value must match the
value entered in Step 3.
<priority> is the syslog priority, for example, info or notice. This value must
match the value entered in Step 3.
<TAB> indicates you must press the TAB key.
<host> indicates the STRM managed host.
Configuring DSMs Guide
10 APACHE HTTP SERVER
Step 6 Restart syslog:
/etc/init.d/syslog restart
Step 7 Restart Apache.
You are now ready to configure the sensor device within the STRM interface. To
configure STRM to receive events from an Apache device, you must select the
Open Source Apache Webserver option from the Sensor Device Type
drop-down list box. For more information on configuring sensor devices, see the
Managing Sensor Devices Guide.
For more information on Apache, see http://www.apache.org/.
Configuring DSMs Guide
5
APPLE MAC OS X
A STRM Apple Mac OS X DSM accepts events using syslog. STRM records all
relevant firewall, web server access, web server error, privilege escalation, and
informational events.
Before you configure STRM to integrate with Mac OS X, you must:
Step 1 Log in as a root user.
Step 2 Open the /etc/syslog.conf file.
Step 3 Add the following line to the top of the file. Make sure all other lines remain intact:
*.*@<IP address>
Where <IP address> is the IP address of the STRM system.
Step 4 Save and exit the file.
Step 5 Send a hang-up signal to the syslog daemon to make sure all changes are
enforced:
sudo killall - HUP syslogd
You are now ready to configure the sensor device within the STRM interface. To
configure STRM to receive events from a Mac OS X server, you must select the
Mac OS X option from the Sensor Device Type drop-down list box. For more
information on configuring sensor devices, see the Managing Sensor Devices
Guide.
See your Mac OS X documentation for more information.
Configuring DSMs Guide
6
ARRAY NETWORK SSL VPN
The STRM Array Networks SSL VPN DSM collects events from an ArrayVPN
appliance using syslog. For details of configuring ArrayVPN appliances for remote
syslog, please consult Array Networks documentation.
Once you configure syslog to forward events to STRM, you are now ready to
configure the sensor device within the STRM interface. To configure STRM to
receive events from a Array Networks SSL VPN device, choose one of the
following options:
If you are using STRM 6.0, you must select ArrayNetworks SSL VPN from the
Sensor Device Type drop-down list box.
If you are using STRM 6.0.1 and above, you must select Array Networks SSL
VPN Access Gateway from the Sensor Device Type drop-down list box.
For more information on configuring sensor devices, see the Managing Sensor
Devices Guide.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228

Juniper Security Threat Response Manager User manual

Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI