Vendor - Juniper
Product - Juniper JunOS
| Ref | Link | 
| Splunk Add-on | https://splunkbase.splunk.com/app/2847/ | 
| JunOS TechLibrary | https://www.juniper.net/documentation/en_US/junos/topics/example/syslog-messages-configuring-qfx-series.html | 
Sourcetypes
| sourcetype | notes | 
| juniper:junos:firewall | None | 
| juniper:junos:firewall:structured | None | 
| juniper:junos:idp | None | 
| juniper:junos:idp:structured | None | 
| juniper:junos:aamw:structured | None | 
| juniper:junos:secintel:structured | None | 
| juniper:junos:snmp | None | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| juniper_junos_flow | juniper:junos:firewall | netfw | none | 
| juniper_junos_idp | juniper:junos:idp | netids | none | 
| juniper_junos_utm | juniper:junos:firewall | netfw | none | 
Filter type
- MSG Parse: This filter parses message content
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index as required.
- Follow vendor configuration steps per referenced Product Manual
Options
| Variable | default | description | 
| SC4S_LISTEN_JUNIPER_JUNOS_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers using legacy 3164 format | 
| SC4S_LISTEN_JUNIPER_JUNOS_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers using legacy 3164 format | 
| SC4S_LISTEN_JUNIPER_JUNOS_TLS_PORT | empty string | Enable a TLS port for this specific vendor product using a comma-separated list of port numbers using legacy 3164 format | 
| SC4S_LISTEN_JUNIPER_JUNOS_STRUCTURED_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers using 5424 format | 
| SC4S_LISTEN_JUNIPER_JUNOS_STRUCTURED_TLS_PORT | empty string | Enable a TLS port for this specific vendor product using a comma-separated list of port numbers using 5424 format | 
| SC4S_DEST_JUNIPER_JUNOS_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present; for Juniper JunOS ensure each host filter condition is verified
index=<asconfigured> sourcetype=juniper:junos:firewall | stats count by host
index=<asconfigured> sourcetype=juniper:junos:idp | stats count by host
Verify timestamp, and host values match as expected
Product - Juniper Netscreen
| Ref | Link | 
| Splunk Add-on | https://splunkbase.splunk.com/app/2847/ | 
| Netscreen Manual | http://kb.juniper.net/InfoCenter/index?page=content&id=KB4759 | 
Sourcetypes
| sourcetype | notes | 
| netscreen:firewall | None | 
Sourcetype and Index Configuration
| key | sourcetype | index | notes | 
| juniper_netscreen | netscreen:firewall | netfw | none | 
Filter type
- Juniper Netscreen products must be identified by host or ip assignment. Update the filter f_juniper_netscreenas required
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index as required.
- Follow vendor configuration steps per Product Manual
Options
| Variable | default | description | 
| SC4S_LISTEN_JUNIPER_NETSCREEN_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_JUNIPER_NETSCREEN_TLS_PORT | empty string | Enable a TLS port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_LISTEN_JUNIPER_NETSCREEN_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers | 
| SC4S_ARCHIVE_JUNIPER_NETSCREEN | no | Enable archive to disk for this specific source | 
| SC4S_DEST_JUNIPER_NETSCREEN_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source | 
Verification
Use the following search to validate events are present; for Juniper Netscreen products ensure each host filter condition is verified
index=<asconfigured> sourcetype=netscreen:firewall | stats count by host
Verify timestamp, and host values match as expected