Take your networking performance to new heights with a modern, cloud-native, AI-Native architecture. Only Juniper can help you unleash the full potential of Wi-Fi 7 with our AI-Native platform for innovation.
Juniper’s AI data center solution is a quick way to deploy high performing AI training and inference networks that are the most flexible to design and easiest to manage with limited IT resources.
Juniper's Ai-Native routing solution delivers robust 400GbE and 800GbE capabilities for unmatched performance, reliability, and sustainability at scale.
Juniper's Ai-Native routing solution delivers robust 400GbE and 800GbE capabilities for unmatched performance, reliability, and sustainability at scale.
Shaping Student Experiences: The NOW Way to Build Higher Education Networks
Juniper Networks CIO Sharon Mandell and a virtual summit of C-level IT leaders from prestigious institutions discuss ongoing efforts to support digital transformation on campus.
Retail experts Kevin McCartan, Senior IT Service Delivery Engineer at Musgrave; Jack Stratten of Insider Trends; and Christian Gilby, Senior Director of Product Marketing at Juniper Networks, discuss customer experiences.
Legacy networks simply cannot meet the demands of today’s rapidly evolving metro landscape. Unlock a new generation of highly scalable architectures and automated operations with the Juniper ACX7020.
Lack of AI innovation from your current networking vendor slowing you down? Embrace Juniper’s cloud-native, AI-Native access switches that support every level and layer, across nearly every deployment.
Delivering practical solutions and enriching discussions, this podcast series is a vital resource for those seeking an in-depth exploration of AI's transformative potential.
Juniper AI Care Services Revolutionize Your Service Experience
Our industry-first AI-Native services couple AIOps with our deep expertise across the full network life cycle. You can move from reactive response to proactive insight and action.
Juniper AI Data Center Deployment Services Optimize Your AI Model Runs
We use our expertise and validated designs to help design, deploy, validate and tune networks, including GPUs and storage, to get the most from your AI infrastructure operation.
Dive deep with leading experts and thought leaders on all the topics that matter most to your business, from AI to network security to driving rapid, relevant transformation for your business.
To encrypt events and send to JSA, you must configure a log source with a TLS Syslog
protocol to establish communication with JSA on port 6514.
Log in to JSA.
Click the Admin tab.
On the navigation menu, click Data Sources.
Click Log Sources > Add.
Configure the following parameters:
Table 1: TLS Log Source for Wincollect Destination
Parameter
Description
Protocol Configuration
TLS Syslog
Log Source Identifier
An IP address or host name to identify the log
source.
TLS Listen Port
The default TLS listen port is 6514.
Authentication Mode
The mode by which your TLS connection is authenticated.
If you select the TLS and Client
Authentication option, you must
configure the certificate parameters.
Client Certificate Path
The absolute path to the client-certificate on disk. The
certificate must be stored on the JSA Console or Event
Collector for this log source.
Certificate Type
The type of certificate to use for authentication for the
server certificate and server key.
Select one of the following options from the
Certificate Type list:
Generated Certificate
Single Certificate and Private
Key
PKCS12 Certificate and
Password
Generated Certificate
This option is available when you configure the
Certificate Type.
If you want to use the default certificate and key that
is generated by JSA for the server certificate and
server key, select this option.
Single Certificate and Private
Key
This option is available when you configure the
Certificate Type.
If you want to use a single PEM certificate for the
server certificate, select this option and then
configure the following parameters:
Provided Server Certificate
Path - The absolute path to the server
certificate.
Provided Private Key Path
- The absolute path to the private key.
Note:
The corresponding private key must be a DER-encoded
PKCS8 key. The configuration fails with any other
key format.
PKCS12 Certificate and
Password
This option is available when you configure the
Certificate Type.
If you want to use a PKCS12 file that contains the server
certificate and server key, select this option and then
configure the following parameters:
PKCS12 Certificate Path -
Type the file path for the PKCS12 file that
contains the server certificate and server
key.
PKCS12 Password - Type the
password to access the PKCS12 file.
Certificate Alias - If
there is more than one entry in the PKCS12 file,
an alias must be provided to specify which entry
to use. If there is only one alias in the PKCS12
file, leave this field blank.
Max Payload Length
The maximum payload length (characters) that is displayed
for TLS Syslog message.
Maximum Connections
The Maximum Connections parameter
controls how many simultaneous connections the TLS
Syslog protocol can accept for each Event Collector.
There is a limit of 1000 connections across all TLS
syslog log source configurations for each Event
Collector. The default for each device connection is
50.
Note:
Automatically discovered log sources that share a
listener with another log source. For example, if
you use the same port on the same event collector,
it counts only one time towards the limit.
TLS Protocols
The TLS Protocol to be used by the log source. Select one
of the following options:
TLS 1.2 and above
TLS 1.1 and above
TLS 1.0 and above
To avoid security vulnerabilities, use TLS 1.2 and
above.
Use As A Gateway Logsource
Sends collected events through the JSA Traffic Analysis
Engine to automatically detect the appropriate log
source.
You must select this in order for JSA to detect/create
the correct log source for events.
When this option is not selected and Log
Source Identifier Pattern is not
configured, JSA receives events as unknown generic log
sources.
Log Source Identifier Pattern
If you selected Use As A Gateway Log
Source, use this option to define a
custom log source identifier for events that are being
processed and for log sources to be automatically
discovered when applicable. If you don't configure the
Log Source Identifier
Pattern, JSA receives events as unknown
generic log sources.
Use key-value pairs to define the custom Log Source
Identifier. The key is the Identifier Format String,
which is the resulting source or origin value. The value
is the associated regex pattern that is used to evaluate
the current payload. This value also supports capture
groups that can be used to further customize the
key.
Define multiple key-value pairs by typing each pattern on
a new line. Multiple patterns are evaluated in the order
that they are listed. When a match is found, a custom
Log Source Identifier displays.
The following examples show multiple key-value pair
functions.
Aggregate multiple messages into single events based on a
Start/End Matching or an ID-Linked regular
expression.
Aggregation Method
This parameter is available when Enable
Multiline is turned on.
ID-Linked - Processes
event logs that contain a common value at the
beginning of each line.
Start/End Matching -
Aggregates events based on a start or end regular
expression (regex).
Event Start Pattern
This parameter is available when Enable
Multiline is turned on and the
Aggregation Method is set to
Start/End Matching.
The regular expression (regex) that is required to
identify the start of a TCP multiline event payload.
Syslog headers typically begin with a date or timestamp.
The protocol can create a single-line event that is
based on solely on an event start pattern, such as a
timestamp. When only a start pattern is available, the
protocol captures all the information between each start
value to create a valid event.
Event End Pattern
This parameter is available when Enable
Multiline is turned on and the
Aggregation Method is set to
Start/End Matching.
This regular expression (regex) that is required to
identify the end of a TCP multiline event payload. If
the syslog event ends with the same value, you can use a
regular expression to determine the end of an event. The
protocol can capture events that are based on solely on
an event end pattern. When only an end pattern is
available, the protocol captures all the information
between each end value to create a valid event.
Message ID Pattern
This parameter is available when Enable
Multiline is turned on and the
Aggregation Method is set to
id-Linked.
This regular expression (regex) required to filter the
event payload messages. The TCP multiline event messages
must contain a common identifying value that repeats on
each line of the event message.
Time Limit
This parameter is available when Enable
Multiline is turned on and the
Aggregation Method is set to
id-Linked.
The number of seconds to wait for more matching payloads
before the event is pushed into the event pipeline. The
default is 10 seconds.
Retain Entire Lines during Event
Aggregation
This parameter is available when Enable
Multiline is turned on and the
Aggregation Method is set to
id-Linked.
If you set the Aggregation Method
parameter to ID-Linked, you can
enable Retain Entire Lines during Event
Aggregation to discard or keep the part
of the events that comes before Message ID
Pattern when concatenating events with
the same ID pattern together.
Flatten Multiline Events Into Single
Line
This parameter is available when Enable
Multiline is turned on.
Shows an event in one single line or multiple lines.
Event Formatter
This parameter is available when Enable
Multiline is turned on.
Use the Windows Multiline option
for multiline events that are formatted specifically for
Windows.
Click Save.
Creating a TLS Log Source Destination for Managed Agents
Create a TLS destination if you want to send encrypted events to JSA appliances.
For any existing log sources that are using WinCollect you must ensure that they
use the TLS destination you created so that the events are encrypted.
Click the Admin tab.
Create a TLS log source destination.
Click Data Sources >
WinCollect.
In the WinCollect window, click
Destinations >
Add.
Give the destination a name, and specify the IP address or hostname
of the console.
In the Protocol menu, select
TCP/TLS (Encrypted).
Paste the certificate, including the BEGIN and END lines.
Find the self-signed certificate in
/opt/qradar/conf/trusted_certificates/syslog-tls.cert.
Click Save.
Create a TLS Syslog log source where the log source type is
Universal DSM and the protocol type is
TLS Syslog.