Fortinet black logo

External Systems Configuration Guide

Citrix Netscaler Application Delivery Controller (ADC)

Citrix Netscaler Application Delivery Controller (ADC)

What is Discovered and Monitored

Protocol

Information discovered

Metrics/Logs collected

Used for

SyslogPermitted and Denied trafficLog analysis and compliance

Event Types

In ADMIN > Device Support > Event, search for "netscaler" in the Device Type column to see the event types associated with this device.

Rules

There are no predefined rules for this device.

Reports

In RESOURCE > Reports , search for "nestler" in the Name column to see the reports associated with this device.

Configuration

Syslog

FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.

  • For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual appliance.
  • For Port, enter 514.
  • The syslog format should be the same as that shown in the example.

Settings for Access Credentials

Use these Access Method Definition settings to allow FortiSIEM to access your device.

Setting Value
Name <set name>
Device Type Citrix NetScalar
Access Protocol See Access Credentials
Port See Access Credentials
Password config See Password Configuration

Example Syslog

<182> 07/25/2012:19:56:41   PPE-0 : UI CMD_EXECUTED 473128 :  User nsroot - Remote_ip 10.13.8.75 - Command "show ns hostName" - Status "Success"<181> 07/25/2012:19:56:05  NS2-MAIL PPE-0 : EVENT DEVICEUP 33376 :  Device "server_vip_NSSVC_SSL_172.17.102.108:443(accellion:443)" - State UP
<181> 07/25/2012:19:55:35  NS2-MAIL PPE-0 : EVENT DEVICEDOWN 33374 :  Device "server_vip_NSSVC_SSL_172.17.102.108:443(accellion:443)" - State DOWN
<182> 07/24/2012:15:37:08   PPE-0 : EVENT MONITORDOWN 472795 :  Monitor Monitor_http_of_Domapps:80(10.50.15.14:80) - State DOWN

Citrix Netscaler Application Delivery Controller (ADC)

What is Discovered and Monitored

Protocol

Information discovered

Metrics/Logs collected

Used for

SyslogPermitted and Denied trafficLog analysis and compliance

Event Types

In ADMIN > Device Support > Event, search for "netscaler" in the Device Type column to see the event types associated with this device.

Rules

There are no predefined rules for this device.

Reports

In RESOURCE > Reports , search for "nestler" in the Name column to see the reports associated with this device.

Configuration

Syslog

FortiSIEM processes events from this device via syslogs sent by the device. Configure the device to send syslogs to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.

  • For Syslog Server, or the server where the syslogs should be sent, enter the IP address of your FortiSIEM virtual appliance.
  • For Port, enter 514.
  • The syslog format should be the same as that shown in the example.

Settings for Access Credentials

Use these Access Method Definition settings to allow FortiSIEM to access your device.

Setting Value
Name <set name>
Device Type Citrix NetScalar
Access Protocol See Access Credentials
Port See Access Credentials
Password config See Password Configuration

Example Syslog

<182> 07/25/2012:19:56:41   PPE-0 : UI CMD_EXECUTED 473128 :  User nsroot - Remote_ip 10.13.8.75 - Command "show ns hostName" - Status "Success"<181> 07/25/2012:19:56:05  NS2-MAIL PPE-0 : EVENT DEVICEUP 33376 :  Device "server_vip_NSSVC_SSL_172.17.102.108:443(accellion:443)" - State UP
<181> 07/25/2012:19:55:35  NS2-MAIL PPE-0 : EVENT DEVICEDOWN 33374 :  Device "server_vip_NSSVC_SSL_172.17.102.108:443(accellion:443)" - State DOWN
<182> 07/24/2012:15:37:08   PPE-0 : EVENT MONITORDOWN 472795 :  Monitor Monitor_http_of_Domapps:80(10.50.15.14:80) - State DOWN