Security Manager for Juniper Networks IDP |
Release Notes |
Date Published: September 2011 |
Configuring Juniper Networks IDP Appliances for Remote Logging |
Security Manager for Juniper Networks IDP allows you to monitor Juniper Networks Intrusion Detection and Prevention (IDP) Appliances in your environment. This module provides knowledge so you can proactively manage Juniper Networks IDP appliances and identify issues before they become critical. Security Manager for Juniper Networks IDP monitors syslog messages generated by Juniper Networks IDP appliances and collects events that may indicate configuration changes or attacks, so you can quickly take corrective or preventative action. For example, Security Manager for Juniper Networks IDP enables you to perform the following tasks:
Security Manager for Juniper Networks IDP also collects events from logs and stores them in secure repositories so you can archive this data, create reports for management or auditing purposes, and analyze critical events to research issues. Security Manager for Juniper Networks IDP collects all log messages you configure your Juniper Networks IDP appliances to send. Security Manager for Juniper Networks IDP supports both data forwarded directly from the IDP Series appliance and IDP data forwarded from the Network and Security Manager (NSM) client. NetIQ often makes improvements to modules in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. You can post feedback in the Security Manager forum on Qmunity, our community Web site that also includes product notifications, blogs, and the Security Manager user group. This document outlines why you should install this module, lists installation requirements, and identifies known issues. Supported ProductsFor the most recently updated list of supported software versions and the availability of module updates, visit the Security Manager Supported Products page. Unless noted otherwise, this module supports all updates, hotfixes, and service packs for the releases listed below. If you encounter problems using this module with a later version of your application, contact NetIQ Technical Support. This release supports the following Juniper Networks Intrusion Detection and Prevention Appliances with IDP OS 5.1 installed:
In addition, this release also supports the following versions of the Network and Security Manager (NSM) client software used to configure IDP appliances:
Why Install This Module?Security Manager for Juniper Networks IDP provides support for received data from monitored Juniper Networks IDP appliances. The volume and type of data that Security Manager for Juniper Networks IDP collects is determined by the configuration of the appliance and the policies you have created for the appliance. System RequirementsThe following table lists additional requirements for a Windows agent. For more information about agent requirements, see the Installation Guide for NetIQ Security Manager.
Installing This ModuleInstall the module using the Module Installer utility. For more information about installing modules, see the User Guide for NetIQ Security Manager. You can verify successful installation of the module in the Module Installer. After the installation completes, verify the Status column indicates the module is current and the module version listed in the Installed Version column is the same as the version in the Available Version column. After you install the module, run the Configuration Wizard to configure Security Manager for Juniper Networks IDP. For more information about using the Configuration Wizard, see the User Guide for NetIQ Security Manager. Configuring Juniper Networks IDP Appliances for Remote LoggingAfter you install the module, you must configure all Juniper Networks IDP appliances in your environment to send messages to a remote syslog server where the Windows agent computer can access the logs. Juniper Networks IDP users use the NSM client to configure logging. You can configure an IDP Series appliance to forward syslog data directly to a remote syslog server, configure NSM to forward IDP data to the syslog server, or configure both to forward data.
You can use any agent computer to monitor Juniper Networks IDP logs, including a central computer or a remote agent. For more information about configuring and using Juniper Networks IDP appliances and the NSM client, see the Juniper Networks IDP Series and NSM product documentation. Configure an IDP Appliance to Directly Forward Syslog DataAfter installing the module, you can configure the IDP appliance to send data to a remote syslog server where Security Manager can monitor that data.
To configure the Juniper Networks IDP appliance to forward data to a remote syslog server:
Create a Syslog Server Object in NSMIf you do not want to directly forward syslog data from an IDP appliance, you can also enable the NSM product to forward data from the IDP appliance to a remote syslog server. Using NSM, you create a new syslog server object and then configure the types of data you want NSM to forward to the syslog server. You can either configure NSM to forward syslog data by IDP appliance or by policy.
To configure NSM to forward Juniper Networks IDP data to a remote syslog server:
Configuring NSM Logging by DeviceIf you use NSM to forward data, you can configure logging globally, sending all data of one or more categories and severities for all monitored Juniper Networks IDP appliances. To define logging criteria globally for all Juniper Networks IDP appliances:
Configuring NSM Logging Using PoliciesIf using NSM to forward data, you can also use the Policy Manager module in NSM to configure the product to forward only data matching a specific set of rules, regardless of the IDP appliance from which it originates. To define logging criteria for Juniper Networks IDP appliances using policies:
Configuring the ModuleConfigure Security Manager for Juniper Networks IDP using the Configuration Wizard. First use the Configuration Wizard to specify the Security Manager agent or agents you want to use to remotely monitor your Juniper Networks IDP environment, then specify the Juniper Networks IDP appliances you want to monitor. Click Finish when you have specified the agents you want to use and appliances you want to monitor. For more information about using the Configuration Wizard, see the User Guide for NetIQ Security Manager. Juniper Networks IDP Event Fields Used by Security ManagerSecurity Manager for Juniper Networks IDP collects various fields from the data received from monitored Juniper Networks IDP appliances. The following table lists the Juniper Networks IDP data fields most commonly used by Security Manager and maps those fields to the corresponding names and values used for real-time alerting, log archival, and Forensic Analysis. You can use these fields to create processing rules or Forensic Analysis queries tailored to your specific environment. For more information about creating processing rules, see the Programming Guide for NetIQ Security Manager.
Contact InformationOur goal is to provide documentation that meets your needs. If you have suggestions for improvements, please email Documentation-Feedback@netiq.com. We value your input and look forward to hearing from you. For detailed contact information, see the Support Contact Information Web site. For interactive conversations with your peers and NetIQ experts, become an active member of Qmunity, our community Web site that offers product forums, product notifications, blogs, and product user groups. Legal NoticeTHIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. © 2011 NetIQ Corporation. All rights reserved. U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government's rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement. Check Point, FireWall-1, VPN-1, Provider-1, and SiteManager-1 are trademarks or registered trademarks of Check Point Software Technologies Ltd. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the USA. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This product claims FIPS compliance by use of one or more of the Microsoft cryptographic components listed below. These components were certified by Microsoft and obtained FIPS certificates via the CMVP. 893 Windows Vista Enhanced Cryptographic Provider (RSAENH) 894 Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 989 Windows XP Enhanced Cryptographic Provider (RSAENH) 990 Windows XP Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 997 Microsoft Windows XP Kernel Mode Cryptographic Module (FIPS.SYS) 1000 Microsoft Windows Vista Kernel Mode Security Support Provider Interface (ksecdd.sys) 1001 Microsoft Windows Vista Cryptographic Primitives Library (bcrypt.dll) 1002 Windows Vista Enhanced Cryptographic Provider (RSAENH) 1003 Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 1006 Windows Server 2008 Code Integrity (ci.dll) 1007 Microsoft Windows Server 2008 Kernel Mode Security Support Provider Interface (ksecdd.sys) 1008 Microsoft Windows Server 2008 1009 Windows Server 2008 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH) 1010 Windows Server 2008 Enhanced Cryptographic Provider 1012 Windows Server 2003 Enhanced Cryptographic Provider (RSAENH) This product may also claim FIPS compliance by use of one or more of the Open SSL cryptographic components listed below. These components were certified by the Open Source Software Institute and obtained the FIPS certificates as indicated. 918 - OpenSSL FIPS Object Module v1.1.2 - 02/29/2008 140-2 L1 1051 - OpenSSL FIPS Object Module v 1.2 - 11/17/2008 140-2 L1 1111 - OpenSSL FIPS Runtime Module v 1.2 - 4/03/2009 140-2 L1 Note: Windows FIPS algorithms used in this product may have only been tested when the FIPS mode bit was set. While the modules have valid certificates at the time of this product release, it is the user's responsibility to validate the current module status. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||