Juniper Networks IDP Series
- What is Discovered and Monitored
- Event Types
- Example Syslog from NSM
- Settings for Access Credentials
What is Discovered and Monitored
|Protocol||Information Discovered||Metrics Collected||Used For|
In ADMIN > Device Support > Event Types, search for "juniper_idp" to see the event types associated with this device.
There are no predefined rules for this device.
There are no predefined reports for this device.
FortiSIEM processes events from this device via syslog sent by the device. Configure the device to send syslog to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
- For Syslog Server, or the server where the syslog should be sent, enter the IP address of your FortiSIEM virtual appliance.
- For Port, enter 514.
- Make sure that the syslog type is Common Event Format (CEF). The syslog format should be the same as that shown in the example.
Example Syslog from NSM
<25>Oct 11 14:29:27 10.146.68.68 20101011, 58420089, 2010/10/11 18:29:25, 2010/10/11 18:33:12, global.IDP, 1631, par-real-idp200, 10.146.68.73, traffic,
udp port scan in progress, (NULL), (NULL), 22.214.171.124, 0, 0.0.0.0, 0, (NULL), (NULL), 10.248.8.110, 0, 0.0.0.0, 0, udp, global.IDP, 1631,
Metro IDP IP / Port Scan Policy, traffic anomalies, 2, accepted, info, yes, 'interface=eth3', (NULL), (NULL), (NULL), 0, 0, 0, 0, 0, 0, 0, 0, no, 25, Not
Settings for Access Credentials
Set these Access Method Definition values to allow FortiSIEM to communicate with your device.
|Device Type||Juniper Netscreen IDP|
|Access Protocol||See Access Credentials|
|Port||See Access Credentials|
|Password config||See Password Configuration|