Stormshield Network Security
To add a Stormshield Network Security device, complete the following steps.
Step 1: Configure the Device
- Log in to the Stormshield CLI using the default Admin user account. This account is the only account allowed to access the CLI and connect to SSH.
- SSH connectivity over Port 22 is required for retrieval.
- Navigate to the Help menu (? icon) and click Configuration & Administration Manual.
- Click Contents > Configuration > Firewall Administration tab.
- Go to the Remote SSH Access section.
- Select Enable password access. The password is the one used for the Admin account.
- If a central syslog will be used, the Syslog Match Name will be found in the Firewall name field. This is found by going to Configuration > System > Configuration > General Configuration > Firewall name.
- For Change:
- Navigate to Configuration > Notification > Logs-Syslog-IPFIX > Syslog.
- Select a syslog profile.
- Set the Protocol as UDP.
- Set the Port as syslog.
- Set the Format as Legacy, legacy_long, or RFC5424.
- In the Advanced Properties section, enable Administration (serverd).
- For Usage:
- Navigate to Configuration > Notification > Logs-Syslog-IPFIX > Syslog.
Select a syslog profile.
- Set the Protocol as UDP.
- Set the Port as syslog.
- Set the Format as Legacy, legacy_long, or RFC5424.
- In the Advanced Properties section, enable Filter Policy.
Step 2: Onboard the Device in the Administration Module
Contact FireMon Support to receive a specific device pack (a .jar file) if it was not included in the FMOS GA release. Review the steps to upload a device pack.
- Click Create and then click Stormshield > Stormshield Network Security.
- General Properties section.
- In the Name box, type the name of the device as you want to see it in SIP.
- In the Description box, type an optional description of the device being added.
- In the Management IP Address box, type the IP address of the device.
- In the Data Collector Group box, select the IP address of the data collector group that will collect data from this device.
- In the Central Syslog Server box, select the syslog server from the list (optional).
Syslog fields are optional if the device uses the same IP for syslog and management.
A central syslog server is required only if syslog messages come from a different IP. A central syslog server must be created before it can be assigned to a device. To track usage via syslog, the device must support Level 3+.
- In the Syslog Match Names box, type the syslog match name (optional). You can enter multiple comma-separated names.
- By default, the Automatically Retrieve Configuration checkbox is selected.
- In the External ID box, type a unique identifier to be used when the device identifier is different than what is displayed in SIP.
- Collection Configuration is enabled on the management station or by duplicating and then editing the default configuration (Device > Collection Configuration). Default is what is set on the installed device pack.
- Device Settings section.
- Credentials
- In the User Name box, type the user name used for the administrator account.
- In the Password box, type the password used for the administrator account.
- In the Re-enter Password box, retype the password entered above.
Retrieval
- By default, Protocol is SSH and the Port is 22
- Monitoring section.
Log Monitoring
Select the Enable Log Monitoring checkbox to use for Rule Usage Analysis.
- Track Usage Via is set to Syslog.
- Log Update Interval is set to 10 (minutes); this number determines how often usage data is sent to the application server.
Select the Enable Check for Change checkbox to enable checking for configuration changes after the specified interval, and perform a retrieval if changes are detected.
- Enter an optional Alternate Syslog Source IP.
- Retrieval section.
Scheduled Retrieval
Select the Enable Scheduled Retrieval checkbox to perform a retrieval at a set time regardless of change detection. This will activate additional fields to complete.
Set the Scheduled Retrieval Time to fit your requirements.
Choose a Scheduled Retrieval Time Zone from the list.
Check for Change Retrieval
Select the Enable Check for Change checkbox to check for configuration changes after the specified interval and perform a retrieval if changes are detected. This will activate an additional field to complete.
The default Check for Change Interval time is 1440 minutes (every 24 hours). You can change the check interval time to best fit your requirements. The minimum required interval is 60 minutes (1 hour).
- Advanced section.
- Select the Use Batch Config Retrieval checkbox if you are manually sending configurations for this device via your DC's batchconfig directory. While this option is enabled, online retrievals will be disabled.
- Select the Automatically Update SSH Keys checkbox if you want the data collector to automatically update the SSH key for a device when a conflict occurs.
- Enforcement section.
Select one of the available enforcement options:
If this device is assigned to an enforcement or change window, it will be listed. If no assignment, changes must be manually pushed for this device.
- Supplemental Routes section.
- Select an Interface.
If you select an Interface, you will not need to select a virtual router and next virtual router. If no interface is selected, you will need to select a Virtual Router and Next Virtual Router.
- Type the Destination IP address.
- Type the Gateway IP address.
- Select a Virtual Router.
- Select a Next Virtual Router.
- Switch the Drop toggle to enable (disabled = Accept).
- Click Add.
- Click Save.
Step 3: Verify Communication
Because automatically retrieving a configuration is enabled by default, there is nothing for you to do. Security Manager will automatically attempt to retrieve a device configuration.
To do a manual retrieval, select the device row, click the Menu icon
and then click Retrieve Configuration.
It may take up to 15 minutes to see the status result of the retrieval.