This quick start guide will help Accenture Security customers configure Juniper Networks® NetScreen Firewall to send logs to the Log Collection Platform (LCP).
The guide details the GUI configuration process. Please refer to the vendor document for more information on the CLI configuration process.
This document includes the following topics:
A list of supported versions is available in the Accenture Security Supported Products List document (Accenture_MSS_Supported_Products_List.xlsx) which can be found at
Accenture Portal - https://mss.accenture.com/PortalNextGen/Reports/Documents
|Juniper NetScreen Firewall||LCP||
To enable syslog for Juniper NetScreen Firewall, follow the steps given below.
Login to the NetScreen web interface.
In the left pane, go to Configuration > Report Settings > Log Settings.
In the central pane, check all the Event Severity check boxes and then click Apply.
In the left pane, go to Configuration > Report Settings > Syslog.
Check the Enable Syslog Messages check box.
In the Source interface drop-down list, choose the NetScreen interface from which the syslog packets need to be sent.
In the Syslog Servers section, check the Enable check box and type the following parameters:
In the IP/Hostname text box, type the LCP IP address.
In the Port text box, type 514.
In the Security Facility drop-down list, choose a security facility level. The default value is Local0.
In the Facility drop-down list, choose a facility level. The default value is Local0.
Note: Both Accept and Deny logs play an important part in the analysis of traffic seen at the firewall. To receive the maximum benefit from a firewall logging to MSS, all rules that make up the installed firewall policy including an Explicit Deny All (also known as Clean-Up ) rule should be configured to log.
The default protocol for syslog. The LCP can also accept logs in TCP.
Note: While TCP offers guaranteed delivery of log packets, it places a larger overhead on the LCP. To balance
TCP for reliability over UDP for speed/simplicity, contact the Accenture Security MSS onboarding team.
|IP Address||Juniper NetScreen IP address||
Logging device IP address mentioned in the Pre-Installation Questionnaire (PIQ).
Note: If the device sends logs using multiple interfaces, contact the Accenture Security MSS onboarding team.
MSS recommended signatures processed by the Juniper NetScreen event collector.
The default port for UDP. For TCP, the default port is 601.
Note: The LCP can be configured to listen on a non-standard port, please advise the Accenture Security
Copyright © 2020 Accenture. All rights reserved.
Accenture, the Accenture Logo, and DeepSight Intelligence are trademarks or registered trademarks of Accenture in the U.S. and other countries. Other names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Accenture and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. ACCENTURE SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Accenture as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.