Security

what needs to configured in netscreen firewall so it can forward syslog to splunk ?

seetharamanPr
New Member

Hi All,

Is there any document which shows the steps of configuration that needs to be done in the firewall to forward traffic to splunk. We are using Netscreen ISG 2000.

Regards
Pradeep

Tags (1)
0 Karma

dmaislin_splunk
Splunk Employee
Splunk Employee

This? http://docs.splunk.com/Documentation/AddOns/released/Juniper/Setup

o enable the Splunk Add-on for Juniper to collect data from your Juniper devices, you need to configure the Juniper devices to produce syslog output with an output format of default or splunk and push it to the data collection node of your Splunk platform installation, usually a universal forwarder.

For syslog configuration instructions, consult the Juniper Networks documentation:

Juniper OS (juniper:junos:idp and juniper:junos:firewall source types): http://www.juniper.net/techpubs/en_US/junos15.1/topics/example/syslog-messages-configuring-qfx-serie...
Juniper Netscreen: http://kb.juniper.net/InfoCenter/index?page=content&id=KB4759
Juniper SSLVPN: Please search the Juniper Networks documentation.
Juniper NSM (juniper:nsm and juniper:nsm:idp source types): http://kb.juniper.net/InfoCenter/index?page=content&id=KB11810
Juniper SRX: http://kb.juniper.net/InfoCenter/index?page=content&id=KB16502

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...