Juniper Networks Steel-Belted Radius
What is Discovered and Monitored
Protocol |
Information discovered |
Metrics collected |
Used for |
---|---|---|---|
SNMP |
Application type |
Process level CPU utilization, Memory utilization |
Performance Monitoring |
WMI |
Application type, service mappings |
Process level metrics: uptime, CPU Utilization, Memory utilization, Read I/O, Write I/O |
Performance Monitoring |
Syslog |
Application type |
Successful and Failed Authentications, Successful and Failed administrative logons, RADIUS accounting logs |
Security Monitoring and compliance |
Event Types
In ADMIN > Device Support > Event Types, search for "Juniper-Steelbelt" to see the event types associated with this device.
Configuration
SNMP
FortiSIEM uses SNMP to discover and monitor this device. Make sure SNMP is enabled for the device as directed in its product documentation. For more information, refer to sections "Discovery Settings" and "Setting Credentials" in the User Guide.
Syslog
- Login as administrator.
- Install and configure Epilog application to convert log files written by Steel-belted Radius server into syslog for sending to FortiSIEM:
- Download Epilog from snare, information to download here, and install it on your Windows Server.
- Launch Epilog from Start→All Programs→InterSect Alliance→Epilog for windows.
- Configure Epilog application as follows:
- Select Log Configuration on left hand panel, click Add button to add log files whose content must be sent to FortiSIEM. These log files are written by the Steelbelted RADIUS server and their paths are correct. Also make sure the Log Type is SteelbeltedLog.
- Select Network Configuration on left hand panel. On the right, set the destination address to that of FortiSIEM server, port to 514 and make sure that syslog header is enabled. Then click Change Configuration button.
- Click the "Apply the latest audit configuration" link on the left hand side to apply the changes to Epilog applications. DHCP logs will now sent to FortiSIEM in real time.