Configure Juniper NGFW to send logs to Arctic Wolf
You can configure Juniper Next-Generation Firewall (NGFW)® to send the necessary logs to Arctic Wolf®.
These resources are required:
- An activated Arctic Wolf Sensor or Virtual Log Collector (vLC)
- Access to a device in the same network as the Juniper SRX device
- A user account with at least Full Access for the Commit Configuration and Basic Settings permissions for the Juniper SRX device
Configure syslog forwarding
- In a terminal, run this command to sign in to the Juniper SRX device:
CODE
ssh <user>@<srx_ip>Where:-
user is the username associated with the account that has at least Full Access for the Commit Configuration and Basic Settings permissions.
-
srx_ip is the IP address of the SRX device.
-
- When prompted, enter your account password.
- Run this command to access the CLI:
CODE
cli - Run this command to enter configuration mode:
CODE
configure - Run these commands to configure syslog forwarding with unstructured data:
CODE
set system syslog host <sensor_ip> port 514 user info set system syslog host <sensor_ip> port 514 authorization info set system syslog host <sensor_ip> port 514 ftp info set system syslog host <sensor_ip> port 514 change-log info set system syslog host <sensor_ip> port 514 interactive-commands info set system syslog source-address <srx_ip>Where:- sensor_ip is the IP address of your Arctic Wolf Sensor, Virtual Sensor (vSensor), or Virtual Log Collector (vLC).
- srx_ip is the IP address of the SRX device.
For more information about facility names and severity levels, see System Logging Facilities and Message Severity Levels.
- Run these commands to configure security logging for security devices, such as IDS, in stream mode:
CODE
set security log mode stream set security log format syslog set security log report set security log stream transport protocol UDP set security log source-address <srx_ip> set security log stream <stream_name> category all set security log stream <stream_name> host <sensor_ip> set security log stream <stream_name> port 514Where:-
srx_ip is the IP address of the SRX device.
-
stream_name is a descriptive name for the log stream, such as
security-log. -
sensor_ip is the IP address of your Arctic Wolf Sensor, vSensor, or vLC.
-
- Run this command to commit your changes.
CODE
commit - To configure session logging for your firewall policy, run one of these commands: To add session logging to an existing firewall policy, run this command:
- For new policies:
CODE
set security policies from-zone <zone> to-zone <zone> policy <policy_name> then log <session_event_type>Where:- zone is the name of the applicable zone, such as
trustoruntrust. - policy_name is the name of a firewall policy.
- session_event_type is the type of session event, such as
session-initorsession-close.
- zone is the name of the applicable zone, such as
- For existing policies:
CODE
edit security policies from-zone <zone> to-zone <zone> server policy <policy_name> then log <session_event_type>Where:- zone is the name of the applicable zone, such as
trustoruntrust. - policy_name is the name of a firewall policy.
- session_event_type is the type of session event, such as
session-initorsession-close.
- zone is the name of the applicable zone, such as
For more information, see Monitoring Security Flow Sessions.
IDP logging is configured by default. For more information, see Configure Multiple IDP Policies and a Default IDP Policy for Unified Security Policies.
- For new policies:
Provide configuration information to Arctic Wolf
- Sign in to the Arctic Wolf Unified Portal.
- In the navigation menu, click
Tickets & Alerts > All Tickets.
- Perform the appropriate action, depending on if you are:
- A new customer — In the Ticket Type list, select Onboarding. Then, click the existing [Deploy] Site Config: <ticket_subject> ticket.
- An existing customer — Click Open a New Ticket.
- On the Open a New Ticket page, configure these settings:
- What is this ticket related to? — Select General request.
- Subject — Enter
Syslog changes. - Related ticket (optional) — Keep empty.
- Message — Enter this information for your Concierge Security® Team (CST):
- Confirmation that you completed the steps in this configuration guide.
- The IP address or hostname of the Arctic Wolf Sensor that you used during the configuration.
- The IP address, timezone, and device type for all sources that you are forwarding.
- Questions or comments that you have.
- Click Send Message.
Your CST reviews the details to make sure that Arctic Wolf is successfully processing the logs.