<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: I need to be able to detect packets dropped by Juniper SSG firewalls due to the firewalls' anti-spoofing in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/I-need-to-be-able-to-detect-packets-dropped-by-Juniper-SSG/m-p/408449#M95595</link>
    <description>&lt;P&gt;unfortunately, i don't have juniper logs to test, but if you show the events from your above search to Juniper f/w engineer and ask them to show you the events specific to packets drop, you can then create a search OR post back those samples.&lt;/P&gt;

&lt;P&gt;You may also want to look at &lt;A href="https://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=KB6991&amp;amp;cat=SCREENOS&amp;amp;actp=LIST"&gt;https://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=KB6991&amp;amp;cat=SCREENOS&amp;amp;actp=LIST&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 27 Feb 2019 10:09:10 GMT</pubDate>
    <dc:creator>lakshman239</dc:creator>
    <dc:date>2019-02-27T10:09:10Z</dc:date>
    <item>
      <title>I need to be able to detect packets dropped by Juniper SSG firewalls due to the firewalls' anti-spoofing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/I-need-to-be-able-to-detect-packets-dropped-by-Juniper-SSG/m-p/408446#M95592</link>
      <description>&lt;P&gt;How can I use SPLUNK to detect packets dropped by the Juniper ScreenOS because of anti-spoofing configuration on the firewall.?&lt;/P&gt;

&lt;P&gt;Any help would be received,&lt;/P&gt;

&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 12:16:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/I-need-to-be-able-to-detect-packets-dropped-by-Juniper-SSG/m-p/408446#M95592</guid>
      <dc:creator>btb2018</dc:creator>
      <dc:date>2019-02-26T12:16:30Z</dc:date>
    </item>
    <item>
      <title>Re: I need to be able to detect packets dropped by Juniper SSG firewalls due to the firewalls' anti-spoofing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/I-need-to-be-able-to-detect-packets-dropped-by-Juniper-SSG/m-p/408447#M95593</link>
      <description>&lt;P&gt;Does the Juniper f/w logs log these events? If yes, can you see them in the syslogs received from them? If we can identify these events with the help of Juniper f/w admins, you will be able to create a search.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 15:00:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/I-need-to-be-able-to-detect-packets-dropped-by-Juniper-SSG/m-p/408447#M95593</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2019-02-26T15:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: I need to be able to detect packets dropped by Juniper SSG firewalls due to the firewalls' anti-spoofing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/I-need-to-be-able-to-detect-packets-dropped-by-Juniper-SSG/m-p/408448#M95594</link>
      <description>&lt;P&gt;Firewall logs are sent to SPLUNK.&lt;BR /&gt;
I go through these having set the index i.e. index=juniper-syslog.&lt;BR /&gt;
However I do not know how to search for packets dropped by anti-spoofing.&lt;BR /&gt;
Any suggestions on which search options I should select?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 09:33:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/I-need-to-be-able-to-detect-packets-dropped-by-Juniper-SSG/m-p/408448#M95594</guid>
      <dc:creator>btb2018</dc:creator>
      <dc:date>2019-02-27T09:33:28Z</dc:date>
    </item>
    <item>
      <title>Re: I need to be able to detect packets dropped by Juniper SSG firewalls due to the firewalls' anti-spoofing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/I-need-to-be-able-to-detect-packets-dropped-by-Juniper-SSG/m-p/408449#M95595</link>
      <description>&lt;P&gt;unfortunately, i don't have juniper logs to test, but if you show the events from your above search to Juniper f/w engineer and ask them to show you the events specific to packets drop, you can then create a search OR post back those samples.&lt;/P&gt;

&lt;P&gt;You may also want to look at &lt;A href="https://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=KB6991&amp;amp;cat=SCREENOS&amp;amp;actp=LIST"&gt;https://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=KB6991&amp;amp;cat=SCREENOS&amp;amp;actp=LIST&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 10:09:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/I-need-to-be-able-to-detect-packets-dropped-by-Juniper-SSG/m-p/408449#M95595</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2019-02-27T10:09:10Z</dc:date>
    </item>
    <item>
      <title>Re: I need to be able to detect packets dropped by Juniper SSG firewalls due to the firewalls' anti-spoofing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/I-need-to-be-able-to-detect-packets-dropped-by-Juniper-SSG/m-p/408450#M95596</link>
      <description>&lt;P&gt;The difficulty is that I'm trying to enable the anti-spoofing function, so I can't work backwards based on what I can currently see. &lt;BR /&gt;
In other words I don't know if Juniper is aware of anti-spoofing on ScreenOS, "notes" that packets don't match the routing table but takes no action until anti-spoofing is enabled, or does it have no awareness of the concept of anti-spoofing until it is enabled?&lt;BR /&gt;
Obviously I want to know what to expect to see if I experience problems related to anti-spoofing before I enable it on my client's equipment, hence the challenge.&lt;BR /&gt;
I also administrate the firewalls but the difficulty still applies. &lt;/P&gt;

&lt;P&gt;Thanks for replying.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 14:12:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/I-need-to-be-able-to-detect-packets-dropped-by-Juniper-SSG/m-p/408450#M95596</guid>
      <dc:creator>btb2018</dc:creator>
      <dc:date>2019-02-27T14:12:34Z</dc:date>
    </item>
    <item>
      <title>Re: I need to be able to detect packets dropped by Juniper SSG firewalls due to the firewalls' anti-spoofing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/I-need-to-be-able-to-detect-packets-dropped-by-Juniper-SSG/m-p/408451#M95597</link>
      <description>&lt;P&gt;We have kind of the same problem.&lt;BR /&gt;
However, this is no Splunk issue...Netscreen firewall logs does not contain those packets because they are dropped before they hit the firewall functionality in ScreenOS.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2019 11:35:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/I-need-to-be-able-to-detect-packets-dropped-by-Juniper-SSG/m-p/408451#M95597</guid>
      <dc:creator>nsommars</dc:creator>
      <dc:date>2019-02-28T11:35:37Z</dc:date>
    </item>
  </channel>
</rss>

