Graylog Illuminate is available for use with Graylog Operations and Graylog Security. Contact sales to learn more about obtaining Graylog Illuminate.

The Juniper SRX line of firewalls combine effective security, SD-WAN, routing, switching and WAN interfaces with next-generation firewall and advanced threat mitigation capabilities. It provides secure connectivity across distributed enterprise locations.

Requirement(s)

  • Juniper SRX devices running Junos OS 17.4. These should be configured to send sd-syslog formatted logs.

  • A Graylog Server with a valid Enterprise license that is running Graylog version 5.0.3 or later.

Graylog Server Requirement

  • This spotlight requires Graylog Server version 5.0.3 or higher. If an earlier version is used, fields will be improperly processed.

Not Supported

  • N/A

Stream Configuration

This technology pack includes one stream:

  • “Illuminate:Juniper Messages”

Hint: If this stream does not exist prior to the activation of the content pack, it will be created and configured to route messages to this stream and the associated index set. There should not be any stream rules configured for this stream.

Index Set Configuration

This technology pack includes one index set definition:

  • “Juniper Logs”

Hint: If this index set is already defined, nothing will be changed. If this index set does not exist, it will be created with retention settings of a daily rotation and 90 days of retention. These settings can be adjusted as required after installation.

Log Format Examples

<14>1 2023-08-02T06:20:55.496Z RT_FLOW - RT_FLOW_SESSION_CREATE [junos@2636.1.1.1.2.129 source-address="192.168.1.2" source-port="49158" destination-address="10.10.10.10" destination-port="80" connection-tag="0" service-name="junos-http" nat-source-address="172.16.1.2" nat-source-port="29479" nat-destination-address="10.10.10.10" nat-destination-port="80" nat-connection-tag="0" src-nat-rule-type="source rule" src-nat-rule-name="trust_Zone" dst-nat-rule-type="N/A" dst-nat-rule-name="N/A" protocol-id="6" policy-name="default-permit" source-zone-name="trust" destination-zone-name="untrust" session-id="6389" username="N/A" roles="N/A" packet-incoming-interface="ge-0/0/1.0" application="UNKNOWN" nested-application="UNKNOWN" encrypted="UNKNOWN" application-category="N/A" application-sub-category="N/A" application-risk="-1" application-characteristics="N/A" src-vrf-grp="N/A" dst-vrf-grp="N/A" tunnel-inspection="Off" tunnel-inspection-policy-set="root" source-tenant="N/A" destination-service="N/A"]

<14>1 2023-08-02T06:20:13.049Z RT_IDS - RT_SCREEN_TCP [junos@2636.1.1.1.2.40 attack-name="SYN flood!" source-address="192.168.1.1" source-port="40001" destination-address="192.168.1.2" destination-port="50010" source-zone-name="trustZone" interface-name="ge-0/0/1.0" action="drop"]

Requirements

  • Juniper SRX Logging

  • Junos OS must be configured to send log messages via the sd-syslog format.

When compared to standard syslog, the sd-syslog format is an overly structured system log file format. Information regarding this format can be found at:

WarningThe expand structured data option in the input to which you send your logs should be unchecked.

What is Provided

Rules to normalize and enrich Juniper SRX log messages.

Juniper SRX Log Message Processing

The Illuminate processing of Juniper SRX log messages provides the following:

  • Field extraction, normalization and message enrichment for Juniper SRX log messages.

  • GIM Categorization of the following messages:

Juniper SRX Log Type GIM Category GIM Subcategory
RT_FLOW_SESSION_CLOSE network network.flow
RT_FLOW_SESSION_CREATE network network.open
IDP_ATTACK_LOG_EVENT network network.flow
APPTRACK_SESSION_CLOSE network network.flow

Juniper SRX Spotlight Content Pack

  • Dashboard: Illuminate:Juniper SRX Overview