Fortinet black logo

External Systems Configuration Guide

Citrix Netscaler Application Delivery Controller (ADC)

Citrix Netscaler Application Delivery Controller (ADC)

What is Discovered and Monitored

Protocol

Information discovered

Metrics/Logs collected

Used for

SyslogPermitted and Denied trafficLog analysis and compliance

Event Types

In ADMIN > Device Support > Event Types, search for "netscaler" to see the event types associated with this device.

Rules

There are no predefined rules for this device.

Reports

In RESOURCES > Reports, search for "netscaler" in the main content panel Search... field to see the reports associated with this device.

Configuration

Syslog

FortiSIEM processes events from this device via syslog sent by the device. Configure the device to send syslog to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.

  • For Syslog Server, or the server where the syslog should be sent, enter the IP address of your FortiSIEM virtual appliance.
  • For Port, enter 514.
  • The syslog format should be the same as that shown in the example.

Example Syslog

<182> 07/25/2012:19:56:41   PPE-0 : UI CMD_EXECUTED 473128 :  User nsroot - Remote_ip 10.13.8.75 - Command "show ns hostName" - Status "Success"<181> 07/25/2012:19:56:05  NS2-MAIL PPE-0 : EVENT DEVICEUP 33376 :  Device "server_vip_NSSVC_SSL_172.17.102.108:443(accellion:443)" - State UP
<181> 07/25/2012:19:55:35  NS2-MAIL PPE-0 : EVENT DEVICEDOWN 33374 :  Device "server_vip_NSSVC_SSL_172.17.102.108:443(accellion:443)" - State DOWN
<182> 07/24/2012:15:37:08   PPE-0 : EVENT MONITORDOWN 472795 :  Monitor Monitor_http_of_Domapps:80(10.50.15.14:80) - State DOWN

Settings for Access Credentials

Use these Access Method Definition settings to allow FortiSIEM to access your device.

Setting Value
Name <set name>
Device Type Citrix NetScalar
Access Protocol See Access Credentials
Port See Access Credentials
Password config See Password Configuration

Citrix Netscaler Application Delivery Controller (ADC)

What is Discovered and Monitored

Protocol

Information discovered

Metrics/Logs collected

Used for

SyslogPermitted and Denied trafficLog analysis and compliance

Event Types

In ADMIN > Device Support > Event Types, search for "netscaler" to see the event types associated with this device.

Rules

There are no predefined rules for this device.

Reports

In RESOURCES > Reports, search for "netscaler" in the main content panel Search... field to see the reports associated with this device.

Configuration

Syslog

FortiSIEM processes events from this device via syslog sent by the device. Configure the device to send syslog to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.

  • For Syslog Server, or the server where the syslog should be sent, enter the IP address of your FortiSIEM virtual appliance.
  • For Port, enter 514.
  • The syslog format should be the same as that shown in the example.

Example Syslog

<182> 07/25/2012:19:56:41   PPE-0 : UI CMD_EXECUTED 473128 :  User nsroot - Remote_ip 10.13.8.75 - Command "show ns hostName" - Status "Success"<181> 07/25/2012:19:56:05  NS2-MAIL PPE-0 : EVENT DEVICEUP 33376 :  Device "server_vip_NSSVC_SSL_172.17.102.108:443(accellion:443)" - State UP
<181> 07/25/2012:19:55:35  NS2-MAIL PPE-0 : EVENT DEVICEDOWN 33374 :  Device "server_vip_NSSVC_SSL_172.17.102.108:443(accellion:443)" - State DOWN
<182> 07/24/2012:15:37:08   PPE-0 : EVENT MONITORDOWN 472795 :  Monitor Monitor_http_of_Domapps:80(10.50.15.14:80) - State DOWN

Settings for Access Credentials

Use these Access Method Definition settings to allow FortiSIEM to access your device.

Setting Value
Name <set name>
Device Type Citrix NetScalar
Access Protocol See Access Credentials
Port See Access Credentials
Password config See Password Configuration