1Juniper. 2How Logtrust. works with Juniper? a security network solution for enterprises and service providers.



Similar documents
_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

1Checkpoint. 2How Logtrust. Check Point is a firewall network that offers solutions. Logtrust offers to Check Point firewall Networks

MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Juniper Networks and IPv6. Tim LeMaster Ipv6.juniper.net

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

ProteusElite:HowTo Proteus Networks Proteus Elite:HowTo Page 1

Application Note: Junos NAT Configuration Examples

Firewall Log Format. Log ID is a Unique 12 characters code (c1c2c3c4c5c6c7c8c9c10c11c12) e.g ,

SRX. SRX Firewalls. Rasmus Elmholt V1.0

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Web Filtering For Branch SRX Series and J Series

Overview. Firewall Security. Perimeter Security Devices. Routers

Who am I? BlackHat RSA

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

LogLogic Juniper Networks JunOS Log Configuration Guide

Implementation Guide. Juniper Networks SRX Series Services Gateways/ Websense V10000 G2 appliance. v7.6

WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES

Figure 29. Filtering options for connection type and the amount of last items to show Figure 30. User Activity View Figure 31.

Juniper Networks Solution Portfolio for Public Sector Network Security

Lab Configure IOS Firewall IDS

Configuring Dynamic VPN v2.1 (last updated 1/2011) Junos 10.4 and above

PIKA µfirewall Cloud Management Guide

Configuring the Juniper NetScreen Firewall Security Policies to support Avaya IP Telephony Issue 1.0

Network Configuration Example

Juniper Networks Solution Portfolio for Public Sector Network Security

Introduction to Endpoint Security

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do?

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

PROFESSIONAL SECURITY SYSTEMS

JUNIPER JN0-332 EXAM QUESTIONS & ANSWERS

Configuring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways

Juniper NetScreen 5GT

- Introduction to Firewalls -

Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario...

Host-based Intrusion Prevention System (HIPS)

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

ΕΠΛ 674: Εργαστήριο 5 Firewalls

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

Security perimeter white paper. Configuring a security perimeter around JEP(S) with IIS SMTP

Apliware firewall. TheGreenBow IPSec VPN Client. Configuration Guide.

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

RSA Event Source Configuration Guide. McAfee Database Security

1. Firewall Configuration

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

System Log Setup (RTA1025W Rev2)

Junos WebApp Secure (formerly Mykonos)

Application Note. Onsight Connect Network Requirements v6.3

HoneyBOT User Guide A Windows based honeypot solution

CONFIGURING TCP/IP ADDRESSING AND SECURITY

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: Contact:

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Solution of Exercise Sheet 5

Monitor Network Activity

Automating Server Firewalls

FIREWALL AND NAT Lecture 7a

Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL:

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Adding an Extended Access List

Secret Server Splunk Integration Guide

Network Connect & Junos Pulse Performance Logs on Windows

How To Monitor Network Activity On Palo Alto Network On Pnetorama On A Pcosa.Com (For Free)

How To Set Up Foglight Nms For A Proof Of Concept

Monitor Network Activity

Monitoring System Status

NETWORK AND SECURITY MANAGER

PRODUCT CATEGORY BROCHURE INTEGRATED FIREWALL/ VPN PLATFORMS

Lecture 23: Firewalls

Reports and Logging. PAN-OS Administrator s Guide. Version 6.1

SonicWALL PCI 1.1 Implementation Guide

Results of Testing: Juniper Branch SRX Firewalls

McAfee Network Security Platform Administration Course

BASIC FIREWALL SERVICES

Security Portfolio. Juniper Networks Integrated Firewall/VPN Platforms. Product Brochure. Internet SRX Fixed Telecommuter or Small Medium Office

Network Defense Tools

Juniper Networks Management Pack Documentation

MyPBX Security Configuration Guide

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

Secure Cloud-Ready Data Centers Juniper Networks

Barracuda Networks Web Application Firewall

Intro to Firewalls. Summary

Snort. A practical NIDS

SecuraLive ULTIMATE SECURITY

Junos Space Security Director

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Deployment Guide for SRX Series Services Gateways in Chassis Cluster Configuration

Integrating Juniper Netscreen (ScreenOS)

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Transcription:

Juniper 1Juniper I t s a security network solution for enterprises and service providers. These are prevention and protection products that provide a full on-line security firewall network against iworm, trojans, spyware, keyloggers and other types of malware. Juniper identifies application traffic with precision, so the firewall security network solution ensures continuous availability of critical applications for the company. Logtrust supports Juniper firewall applications such as SRX, ISG/SSG security devices. 2How Logtrust works with Juniper? L ogtrust offers Juniper Networks users a set of advanced security alerts and an alert management application. Logtrust specializes in offering real-time Big Data solutions that allow the integration, management and easy visualization of all the data generated by firewalls to obtain security alerts. Logtrust enables efficient and flexible real time alert management, allowing you to customize alerts. Security administrators can investigate incidents in minutes instead of hours or days. As well, human resource departments can use Logtrust dashboards and reports to track security compliance. With Logtrust you can automatically change the configuration of your Juniper Networks firewalls. So if you identify a potential security risk in message logs, you can update with that user s profile on the Juniper Networks firewall. You can create your own dashboards, visualizations and alerts to match specific use cases as needed. All your relevant data can be searched and analysed from a single place with Logtrust, get notified about where the attackers and malicious insiders are that may have previously passed undetected. 2 Thanks to a real-time report you will be able to see all the firewalls in your infrastructure, no matter where they are located on your network, or if they belong to different manufacturers. You can decide if you want to analyse the activity of a specific firewall, of a cluster, of those belonging to the same manufacturer or all of them together. Use advanced visualization techniques to review your most relevant data and geo-locate attacking IP addresses on heat maps.

T he logs from a Juniper firewall are marked with the firewall.juniper.type.subtype tag. 3.1 Tag structure The concept type and subtype are fixed. They identify the type and format of the event that is being sent. These concepts may take one of the following values (corresponding to the different log types): 3How to integrate Juniper with Logtrust firewall.juniper.srx.traffic firewall.juniper.srx.utm firewall.juniper.srx.idp firewall.juniper.srx.system firewall.juniper.isg.traffic (OPT: firewall.juniper ssg. traffic firewall.juniper.isg.system (OPT: firewall.juniper ssg. system) 3.2 In-house relay configuration As discussed above, it s necessary to install an in-house relay (See section: logtrust in-house relay) for the correct tagging of these logs. You should define a new rule in which all the events from the Juniper IP coming to port 514 UDP are tagged as firewall. juniper.type.subtype. This rule should also be in charge of adding the corresponding type.subtype to the firewall.juniper, depending on the nature of the event. This information is extracted from the message using i.e. regular expressions and then, the captured data, is used to create the final label for each event. There is a possibility to change which port the log events are sent to, but in this example the standard syslog port 514 UDP is used. Create the Relay rules as follows: Rule 1: srcport= 514 srctag: RT_FLOW dsttag: firewall.juniper.srx.traffic Rule 2: srcport= 514 srctag: RT_UTM dsttag: firewall.juniper.srx.utm 3

Rule 3: srcport= 514 srctag: RT_IDP dsttag: firewall.juniper.srx.idp Rule 4: srcport= 514 dsttag: firewall.juniper.srx.system Log without tag Figure 1-4: Rule definitions. 4

Figure 5: Juniper rule base. NOTE: The System log will show evens from the *nix system. 3.3 SRX Log drops - rule. NOTE: The SRX, by default does not log the dropped packets. To do this, a rule needs to be defined at the end of the rule base to drop all and to activate the logging: JunOS versions earlier than v11.4: index?page=content&id=kb20778 5

Configuration Create a template group. Set groups default-deny-template security policies from-zone <*> to-zone <*> policy defult-deny match source-address any set groups default-deny-template security policies fromzone <*> to-zone <*> policy defult-deny match destinationaddress any set groups default-deny-template security policies from-zone <*> to-zone <*> policy defult-deny match application any set groups default-deny-template security policies from-zone <*> to-zone <*> policy defult-deny then deny set groups default-deny-template security policies from-zone <*> to-zone <*> policy defult-deny then log session-init Where <*> is a wild card character, to match any security zone. Apply the group. The following configuration statement applies the template groups between all zones for which a policy context already exists. set apply-groups default-deny-template JunOS versions later than v11.4: index?page=content&id=kb28109 Configuration set security policies global policy default-deny match sourceaddress any set security policies global policy default-deny match destination-address any set security policies global policy default-deny match application any set security policies global policy default-deny then deny set security policies global policy default-deny then log session-init 6

3.4 Juniper Structured-data format: In case the structured-data format is activated, some modifications have to be made to the In-house Relay rule. To set the structured-data mode: set system syslog file policy_session structured-data set system syslog file default-log-messages structured-data 3.4.1 Relay Rules The In-House Relay rules for structured-data mode. All rules have to be applied: Rule 1: port=13003 sourcedata=^.*? RT_FLOW -.*$ tag=firewall.juniper.srx.traffic logwithouttag Rule 2: port=13003 sourcedata=^.*? RT_UTM -.*$ tag=firewall.juniper.srx.utm logwithouttag Rule 3: port=13003 sourcedata=^.*? RT_IDP -.*$ tag=firewall.juniper.srx.idp logwithouttag Rule 4: srcip= <Juniper IP> port=13003 tag=firewall.juniper.srx.system logwithouttag 3.5 Firewall Juniper ISG / SSG Using the NSM GUI, it is not possible to send to the same remote logger using two different destination ports, one for traffic and another for system. Instead we need to separate events in the In-House Relay using two different event processing rules from the same port and IP. 3.5.1 Relay Rules Rule 1: srcport: 514 sourcemessage: \[Root\]system-[^-]+-[0-9]+\(traffic\): dsttag as: firewall.juniper.isg.traffic Stop processing 7

Figure 6: Rule definition. Apply the new settings. Rule 2: srcip: <Juniper IP> srcport: 514 dst Tag all the rest as: firewall.juniper.isg.system Figure 7: Rule definition. Figure 8: Rule base. 8

3.6 Annexes: Juniper info: http://www.juniper.net/techpubs/en_us/junos11.2/ information-products/topic-collections/security/software-all/ security/index.html?topic-41980.html index?page=content&id=kb15216 index?page=content&id=kb16502 index?page=content&id=kb16509 index?page=content&id=kb16506 http://jncie-sec.exactnetworks.net/2012/11/security-policieslogging-srx-traffic.html Juniper structured-data format: http://www.juniper.net/techpubs/en_us/junos13.2/topics/task/ configuration/syslog-single-chassis-system-structured-dataformat-configuring.html Description of CREATED, CLOSED and DENY field types: http://www.juniper.net/documentation/en_us/junos13.2/ topics/reference/general/syslog-interpreting-msgs-structureddata-qfx-series.html http://jncie-sec.exactnetworks.net/2012/11/securitypolicies-logging-srx-traffic.html 9