- What is Discovered and Monitored
- Event Types
- Example Syslog
- Settings for Access Credentials
|Syslog||Permitted and Denied traffic||Log analysis and compliance|
In ADMIN > Device Support > Event Types, search for "netscaler" to see the event types associated with this device.
There are no predefined rules for this device.
In RESOURCES > Reports, search for "netscaler" in the main content panel Search... field to see the reports associated with this device.
FortiSIEM processes events from this device via syslog sent by the device. Configure the device to send syslog to FortiSIEM as directed in the device's product documentation, and FortiSIEM will parse the contents.
- For Syslog Server, or the server where the syslog should be sent, enter the IP address of your FortiSIEM virtual appliance.
- For Port, enter 514.
- The syslog format should be the same as that shown in the example.
<182> 07/25/2012:19:56:41 PPE-0 : UI CMD_EXECUTED 473128 : User nsroot - Remote_ip 10.13.8.75 - Command "show ns hostName" - Status "Success"<181> 07/25/2012:19:56:05 NS2-MAIL PPE-0 : EVENT DEVICEUP 33376 : Device "server_vip_NSSVC_SSL_172.17.102.108:443(accellion:443)" - State UP <181> 07/25/2012:19:55:35 NS2-MAIL PPE-0 : EVENT DEVICEDOWN 33374 : Device "server_vip_NSSVC_SSL_172.17.102.108:443(accellion:443)" - State DOWN <182> 07/24/2012:15:37:08 PPE-0 : EVENT MONITORDOWN 472795 : Monitor Monitor_http_of_Domapps:80(10.50.15.14:80) - State DOWN
Use these Access Method Definition settings to allow FortiSIEM to access your device.
|Device Type||Citrix NetScalar|
|Access Protocol||See Access Credentials|
|Port||See Access Credentials|
|Password config||See Password Configuration|