Citrix Netscaler Application Delivery Controller (ADC)
What is Discovered and Monitored
Protocol | Information discovered | Metrics/Logs collected | Used for |
---|---|---|---|
Syslog | Permitted and Denied traffic | Log analysis and compliance |
Event Types
In ADMIN > Device Support > Event, search for "netscaler" in the Device Type column to see the event types associated with this device.
Rules
There are no predefined rules for this device.
Reports
In RESOURCE > Reports , search for "nestler" in the Name column to see the reports associated with this device.
Configuration
Syslog
FortiSIEM processes events from this device via syslog sent by the device. Configure the device to send syslog to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
- For Syslog Server, or the server where the syslog should be sent, enter the IP address of your FortiSIEM virtual appliance.
- For Port, enter 514.
- The syslog format should be the same as that shown in the example.
Settings for Access Credentials
Use these Access Method Definition settings to allow FortiSIEM to access your device.
Setting | Value |
---|---|
Name | <set name> |
Device Type | Citrix NetScalar |
Access Protocol | See Access Credentials |
Port | See Access Credentials |
Password config | See Password Configuration |
Example Syslog
<182> 07/25/2012:19:56:41 PPE-0 : UI CMD_EXECUTED 473128 : User nsroot - Remote_ip 10.13.8.75 - Command "show ns hostName" - Status "Success"<181> 07/25/2012:19:56:05 NS2-MAIL PPE-0 : EVENT DEVICEUP 33376 : Device "server_vip_NSSVC_SSL_172.17.102.108:443(accellion:443)" - State UP <181> 07/25/2012:19:55:35 NS2-MAIL PPE-0 : EVENT DEVICEDOWN 33374 : Device "server_vip_NSSVC_SSL_172.17.102.108:443(accellion:443)" - State DOWN <182> 07/24/2012:15:37:08 PPE-0 : EVENT MONITORDOWN 472795 : Monitor Monitor_http_of_Domapps:80(10.50.15.14:80) - State DOWN