Micro Focus Security Arcsight Connectors: Smartconnector For Fortinet Fortigate Syslog Configuration Guide
Micro Focus Security Arcsight Connectors: Smartconnector For Fortinet Fortigate Syslog Configuration Guide
Connectors
SmartConnector for Fortinet FortiGate Syslog
Configuration Guide
Copyright © 2005 – 2018 Micro Focus and its affiliates and licensors.
Warranty
The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro
Focus”) are set forth in the express warranty statements accompanying such products and services.
Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be
liable for technical or editorial errors or omissions contained herein. The information contained herein
is subject to change without notice.
Confidential computer software. Except as specifically indicated otherwise, a valid license from Micro
Focus is required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial
Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are
licensed to the U.S. Government under vendor's standard commercial license.
Trademark Notices
Adobe™ is a trademark of Adobe Systems Incorporated. Microsoft® and Windows® are U.S. registered
trademarks of Microsoft Corporation. UNIX® is a registered trademark of The Open Group.
Revision History
Date Description
12/17/2018 Updated Fortigate mappings to ArcSight ESM Fields.
11/19/2018 Updated Fortigate mappings to ArcSight ESM Fields.
07/16/2018 Updated Traffic mappings.
10/17/2017 Added encryption parameters to Global Parameters.
06/15/2017 Updated Event mappings and UTM mappings.
11/30/2016 Updated installation procedure for setting preferred IP address mode.
02/15/2016 Added support for FortiGate OS version 5.2. Removed support for versions 3.0 and 4.0 due to end of support by the vendor.
11/17/2015 Updated mappings.
05/15/2015 Added new parameters for Syslog File.
06/28/2013 Added support for Fortinet OS v5.0 and IPv6 mappings.
05/15/2012 Added new installation procedure.
06/30/2011 End of life for FortiGate OS version 2.8.
Configuration Guide
This guide provides information for installing the SmartConnector for Fortinet FortiGate Syslog
and configuring the device for syslog event collection. OS versions 5.0, and 5.2 are supported.
Product Overview
The FortiGate appliance provides security monitoring and intrusion protection services. FortiGate
closes the vulnerability window by stopping viruses and worms before they enter the network, and
stops attacks that evade conventional antivirus products with realtime response to fast-spreading
threats.
Configuration
FortiGate OS Versions 5.0 and 5.2 Configuration
For information enabling and configuring logging for Fortinet FortiGate, see "Logging and
Reporting for FortiOS 5.2" at the following URL:
http://docs.fortinet.com/uploaded/files/2180/fortigate-loggingreporting-52.pdf
Enabling Logging
4 Select Enable.
6 Click Apply.
Configuring Logging
2 Select Log&Report, then Log Config; the Log Setting tab is displayed.
4 Enter the IP address of the remote computer running syslog server software.
6 Select the severity level for which you want to record log messages. The FortiGate appliance
will log all levels of severity down to but not lower than the level you select. For example, if
you want to record emergency, alert, critical, and error messages, select Error.
7 Select the Facility to be used from the drop-down list or accept the default value.
8 Click Apply.
To enable logging to multiple Syslog servers using the CLI, enter the following:
By default, most FortiGate features are enabled for logging. Refer to this example to disable the
FortiGate features you do not want the Syslog server to record:
Syslog Daemon
Syslog Pipe
Syslog File
If you are using the SmartConnector for Syslog Daemon, simply start the connector, either as a
service or as a process, to start receiving events; no further configuration is needed.
Messages longer than 1024 bytes may be split into multiple messages on
syslog daemon; no such restriction exists on syslog file or pipe.
When a syslog daemon is already in place and configured to receive syslog messages, an extra line
in the syslog configuration file (rsyslog.conf) can be added to write the events to either a
file or a system pipe and the ArcSight SmartConnector can be configured to read the events from
it. In this scenario, the ArcSight SmartConnector runs on the same machine as the syslog daemon.
The Syslog Pipe SmartConnector is designed to work with an existing syslog daemon. This
SmartConnector is especially useful when storage is a factor. In this case, syslogd is configured to
write to a named pipe, and the Syslog Pipe SmartConnector reads from it to receive events.
The Syslog File SmartConnector is similar to the Pipe SmartConnector; however, this
SmartConnector monitors events written to a syslog file (such as messages.log) rather than
to a system pipe.
This section provides information about how to set up your existing syslog infrastructure to send
events to the ArcSight Syslog Pipe or File SmartConnector.
The standard UNIX implementation of a syslog daemon reads the configuration parameters from
the /etc/rsyslog.conf file, which contains specific details about which events to write to files, write
to pipes, or send to another host. First, create a pipe or a file; then modify the /etc/rsyslog.conf file
to send events to it.
mkfifo /var/tmp/syspipe
*.debug /var/tmp/syspipe
or
*.debug |/var/tmp/syspipe
3 After you have modified the file, restart the syslog daemon either by executing the scripts
/etc/init.d/syslogd stop and /etc/init.d/syslogd start, or by sending a `configuration restart`
signal.
This command forces the syslog daemon to reload the configuration and start writing to the
pipe you just created.
Create a file or use the default for the file into which log messages are to be written.
After editing the /etc/rsyslog.conf file, be sure to restart the syslog daemon as described
above.
When you follow the SmartConnector Installation Wizard, you will be prompted for the absolute
path to the syslog file or pipe you created.
Syslog Installation
Install this SmartConnector (on the syslog server or servers identified in the Configuration
section) using the SmartConnector Installation Wizard appropriate for your operating system. The
wizard will guide you through the installation process. When prompted, select one of the following
Syslog connectors (see Configure the Syslog SmartConnectors in this guide for more information):
Syslog Daemon
Syslog Pipe
Syslog File
Because all syslog SmartConnectors are sub-connectors of the main syslog SmartConnector, the
name of the specific syslog SmartConnector you are installing is not required during installation.
The syslog daemon connector by default listens on port 514 (configurable) for UDP syslog events;
you can configure the port number or use of the TCP protocol manually. The syslog pipe and
syslog file connectors read events from a system pipe or file, respectively. Select the one that best
fits your syslog infrastructure setup.
For complete product information, read the Administrator's Guide as well as the Installation and
Configuration guide for your ArcSight product before installing a new SmartConnector. If you are
adding a connector to the ArcSight Management Center, see the ArcSight Management Center
Administrator's Guide for instructions, and start the installation procedure at "Set Global
Parameters (optional)" or "Select Connector and Add Parameter Information."
Administrator passwords
1 Download the SmartConnector executable for your operating system from the Micro Focus
SSO site.
2 Start the SmartConnector installation and configuration wizard by running the executable.
Follow the wizard through the following folder selection tasks and installation of the core
connector software:
Introduction
Choose Install Folder
Choose Shortcut Folder
Pre-Installation Summary
Installing...
3 When the installation of SmartConnector core component software is finished, the following
window is displayed:
Parameter Setting
FIPS mode Select 'Enabled' to enable FIPS compliant mode. To enable FIPS Suite B Mode, see the
SmartConnector User Guide under "Modifying Connector Parameters" for instructions. Initially, this
value is set to 'Disabled'.
Remote Management Select 'Enabled' to enable remote management from ArcSight Management Center. When queried
by the remote management device, the values you specify here for enabling remote management
and the port number will be used. Initially, this value is set to 'Disabled'.
Remote Management The remote management device will listen to the port specified in this field. The default port
Listener Port number is 9001.
Preferred IP Version When both IPv4 and IPv6 IP addresses are available for the local host (the machine on which the
connector is installed), you can choose which version is preferred. Otherwise, you will see only one
selection. The initial setting is IPv4.
The following parameters should be configured only if you are using Micro Focus SecureData
solutions to provide encryption. See the Micro Focus SecureData Architecture Guide for more
information.
Parameter Setting
Format Preserving Data leaving the connector machine to a specified destination can be encrypted by selecting ‘Enabled’ to
Encryption encrypt the fields identified in ‘Event Fields to Encrypt' before forwarding events. If encryption is enabled,
it cannot be disabled. Changing any of the encryption parameters again will require a fresh installation of
the connector.
Format Preserving Enter the URL where the Micro Focus SecureData Server is installed.
Policy URL
Proxy Server (https) Enter the proxy host for https connection if any proxy is enabled for this machine.
Parameter Setting
Proxy Port Enter the proxy port for https connection if any proxy is enabled for this machine.
Format Preserving The Micro Focus SecureData client software allows client applications to protect and access data based
Identity on key names. This key name is referred to as the identity. Enter the user identity configured for Micro
Focus SecureData.
Format Preserving Enter the secret configured for Micro Focus SecureData to use for encryption.
Secret
Event Fields to Encrypt Recommended fields for encryption are listed; delete any fields you do not want encrypted and add any
string or numeric fields you want encrypted. Encrypting more fields can affect performance, with 20 fields
being the maximum recommended. Also, because encryption changes the value, rules or categorization
could also be affected. Once encryption is enabled, the list of event fields cannot be edited.
After making your selections, click Next. A summary screen is displayed. Review the summary of
your selections and click Next. Click Continue to return to proceed with "Add a Connector" window.
Continue the installation procedure with "Select Connector and Add Parameter Information."
3 Enter the required SmartConnector parameters to configure the SmartConnector, then click
Next.
Syslog Network port The SmartConnector for Syslog Daemon listens for syslog events from this port.
Daemon
Parameters
IP Address The SmartConnector for Syslog Daemon listens for syslog events only from this IP address (accept
the default (ALL) to bind to all available IP addresses).
Protocol The SmartConnector for Syslog Daemon uses the selected protocol (UDP or Raw TCP) to receive
incoming messages.
Forwarder Change this parameter to 'true' only if the events being processed are coming from another
SmartConnector sending to a CEF Syslog destination, and that destination also has CEF forwarder
mode enabled. That allows attributes of the original connector to be retained in the original agent
fields.
Syslog Pipe Pipe Absolute path to the pipe, or accept the default: /var/tmp/syspipe
Parameter Absolute
Path Name
Syslog File File Absolute Enter the full path name for the file from which this connector will read events or accept the
Parameters Path Name default: \var\adm\messages (Solaris) or \var\log\messages (Linux).
A wildcard pattern can be used in the file name; however, in realtime mode, rotation can occur only
if the file is over-written or removed from the folder. Realtime processing mode assumes following
external rotation.
For date format log rotation, the device writes to 'filename.timestamp.log' on a daily basis. At a
specified time, the device creates a new daily log and begins to write to it. The connector detects
the new log and terminates the reader thread to the previous log after processing is complete. The
connector then creates a new reader thread to the new 'filename.timestamp.log' and begins
processing that file. To enable this log rotation, use a date format in the file name as shown in the
following example:
filename'yyyy-MM-dd'.log;
For index log rotation, the device writes to indexed files - 'filename.log.001', 'filename.log.002',
'filename.log.003', and so on. At startup, the connector processes the log with highest index. When
the device creates a log with a greater index, the connector terminates the reader thread to the
previous log after processing completes, creates a thread to the new log, and begins processing
that log. To enable this log rotation, use an index format, as shown in the following example:
filename'%d,1,99,true'.log;
Specifying 'true' indicates that it is allowed for the index to be skipped; for example, if 5 appears
before 4, processing proceeds with 5 and will not read 4, even if 4 appears later. Use of 'true' is
optional.
Reading Specify whether file is to be read in batch or realtime mode. For batch mode, all files are read from
Events Real the beginning. The 'Action Upon Reaching EOF' and 'File Extension if Rename Action' parameters
Time or apply for batch mode only.
Batch
Action Upon For batch mode, specify 'None', 'Rename', or 'Delete' as the action to be performed to the file when
Reaching the connector has finished reading and reaches end of file (EOF). For realtime mode, leave the
EOF default value of 'None' for this parameter.
File For batch mode, specify the extension to be added to the file name if the action upon EOF is
Extension If 'Rename' or accept the default value of '.processed'.
Rename
Action
Select a Destination
1 The next window asks for the destination type; select a destination and click Next. For
information about the destinations listed, see the ArcSight SmartConnector User Guide.
2 Enter values for the destination. For the ArcSight Manager destination, the values you enter
for User and Password should be the same ArcSight user name and password you created
during the ArcSight Manager installation. Click Next.
3 Enter a name for the SmartConnector and provide other information identifying the
connector's use in your environment. Click Next. The connector starts the registration
process.
4 If you have selected ArcSight Manager as the destination, the certificate import window for
the ArcSight Manager is displayed. Select Import the certificate to the connector from
destination and click Next. (If you select Do not import the certificate to connector from
destination, the connector installation will end.) The certificate is imported and the Add
connector Summary window is displayed.
2 The wizard now prompts you to choose whether you want to run the SmartConnector as a
stand-alone process or as a service. If you choose to run the connector as a stand-alone
process, select Leave as a standalone application, click Next, and continue with step 5.
3 If you chose to run the connector as a service, with Install as a service selected, click Next. The
wizard prompts you to define service parameters. Enter values for Service Internal Name and
Service Display Name and select Yes or No for Start the service automatically. The Install
Service Summary window is displayed when you click Next.
For instructions about upgrading the connector or modifying parameters, see the SmartConnector
User Guide.
If the connector is installed in stand-alone mode, it must be started manually and is not
automatically active when a host is restarted. If installed as a service or daemon, the connector
runs automatically when the host is restarted. For information about connectors running as
services or daemons, see the ArcSight SmartConnector User Guide.
To run all SmartConnectors installed in stand-alone mode on a particular host, open a command
window, go to $ARCSIGHT_HOME\current\bin and run: arcsight connectors