Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Juniper Networks Firewall and VPN

The Juniper Networks Firewall and VPN DSM for JSA accepts Juniper Firewall and VPN events by using UDP syslog.

JSA records all relevant firewall and VPN events.

Note:

TCP syslog is not supported. You must use UDP syslog.

You can configure your Juniper Networks Firewall and VPN device to export events to JSA.

  1. Log in to your Juniper Networks Firewall and VPN user interface.

  2. Select Configuration >Report Settings >Syslog.

  3. Select the Enable Syslog Messages check box.

  4. Type the IP address of your JSA console or Event Collector.

  5. Click Apply.

    You are now ready to configure the log source in JSA.

Configuring JSA to Receive Events

You can configure JSA to receive events from a Juniper Networks Firewall and VPN device.

  1. From the Log Source Type list, select Juniper Networks Firewall and VPN option.

    For more information about your Juniper Networks Firewall and VPN device, see your Juniper documentation.

Juniper Networks Firewall Sample Event Message

Use this sample event message to verify a successful integration with JSA.

Note:

Due to formatting issues, paste the message format into a text editor and then remove any carriage return or line feed characters.

Juniper Networks Firewall and VPN sample message when you use the syslog protocol

The following sample event message shows that a user is successfully added to a group.

Table 1: Highlighted Fields

JSA field name

Highlighted payload field name

Source IP

10.12.2.5

Source Port

37314

Event Category

NetScreen device_id

Event Name

Admin + logged on via Telnet

Event ID

Admin + user + logged on via Telnet