Stonesoft SMC
To use a Stonesoft SMC management station, complete the following steps.
Step 1: Configure the Device
FireMon strives to provide up-to-date product information, however we are not always aware when vendors change their device UI. If any Configure the Device procedure differs from your device version (UI location of fields, not information needed), please consult your device's user guide.
You must enable the application programming interface (API) for the Stonesoft Management Center (SMC) in the Management Client. You can do this in the properties of the Management Server that handles the requests from the external applications or scripts.
The API clients that use SMC API must also be defined in the Management Client and given the appropriate permissions. You can define the API clients and their permissions using API Client elements. In addition, you must allow SMC API connections from the IP addresses of the API clients to the Management Server.
To establish these connections, complete the following steps.
- Log in to the data collector and run the following commands:
openssl genrsa > privkey.pem
openssl req -new -x509 -key privkey.pem -out cacert.pem
The output will be two files:
- privkey.pem—the private key file
- cacert.pem—the certificate generated using the private key
After entering the second command, you will be asked to provide additional information. The Common Name is where you enter the Host Name of the server. This Common Name or Host Name will be needed for upcoming configuration steps. You must use the same Common Name or Subject Alternative Name in both the application server and SSL Certificate or the application server and distributed data collectors will lose connection.
- Copy both saved files to the computer that the SMC management client is installed on.
For SMC versions prior to 6.0
- In the device interface, click Monitoring > System Status.
- Expand the Servers list, right-click Management Server and then click Properties.
- On the Management Server - Properties dialog box, select the SMC API tab.
- Select the Enable check box.
- Verify that the host name entered in step 1 is displayed in the Host Name box.
- At the Server Credentials box, click Select....
- In the Select Element dialog box, click the new server and then click Select. If no server is listed, then do the following:
- Click Tools > New > Server Credentials.
- In the Server Credentials Properties dialog box:
- Type a Name for the properties.
- Click Import for both the Private Key and Certificate. These are the files you created and saved in steps 1 and 2 above.
- Click OK. You will return to the Select Element dialog box.
- Click the server name, and then click Select.
- Click OK.
- To create a new API Client Element, click Configuration > Configuration> Administration.
- Right-click Access Rights > New > API Client.
- On the API Client Properties dialog box:
- Click the General tab.
- Type a unique name for the device in the Name box.
- Click Generate Authentication Key. Write down the key. You will need this information for a later step.
- To define the API Client's permissions, click the Permissions tab.
- Select Unrestricted Permissions (Superuser).
- Click OK.
- Restart the SMC service on the Stonesoft server for the changes to take effect using the service sgMgtServer –full-restart command.
For SMC versions 6.0 and above
If these steps differ from what you see in the Stonesoft UI, please refer to Stonesoft help documentation for how to configure SMC API.
- In the device interface, click Configuration > User Authentication.
-
In the User Authentication options, expand Other Elements > Certificates, right-click on Pending Certificate Requests and select New Pending Certificate Request.
-
Enter a Name and Common Name (CN) for the request, and click OK.
-
Right-click on the certificate request and select Self-Sign.
-
Enter a Name for the server credentials and click OK.
-
When asked if you want to remove the certificate request, click Yes.
-
Click Configuration > Security Engine.
-
In the Security Engine options, open Network Elements > Servers, right-click on Management Server and select Properties.
-
In the SMC API tab of Management Server - Properties, click Select, select the name of the server credentials created in step 7 above, and click Select.
-
Click OK to close the Management Server properties.
- Click Configuration > Administration > Access Rights > API Clients.
-
Right-click on API Clients and select New API Client.
- In the General tab, enter the server credentials name, copy the authentication key, and click OK.
- Copy the key to a temporary location because you cannot get the same key again from the API client settings.
If the key is lost before you enter it into the Administration module, you must generate a new key.
-
In the Permissions tab, select Unrestricted Permissions and select the Superuser role.
- Click OK.
Setup Syslog Forwarding
- In the device interface, click Monitoring > System Status.
- Expand the Servers list and right-click Log Server, and then click Properties.
- Click the Log Forwarding tab, and then click Add.
- In the LogServer - Properties dialog box, right-click on each cell of the row to add the appropriate settings:
- Target Host: the data collector to send the syslog messages to
If the data collector is not listed, you'll need to add it. Navigate to Tools > New > Host Properties. Complete the Name and IPv4 fields in the dialog box, and click OK. Select the new entry and then click OK.
- Service: UDP
- Port: 514
- Format: CEF
- Data Type: FW
- Filter: Empty Filter
- Click OK.
- Verify that each firewall rule in the different policies are set up to log correctly:
- Right-click in the "logging" cell of the firewall rule and click Edit Logging. This will open the Logging - Select Rule Options dialog box.
- Select the Override Settings Inherited from Continue Rule(s) check box.
- Change the Log Level to Stored from the list.
- Change the Connection Closing to Normal Log from the list.
- Click OK.
Step 2: Onboard the Device in the Administration Module
- On the toolbar, click Device > Management Stations.
- Click Create, and then click Forcepoint > Stonesoft SMC.
- General Properties section.
- In the Name box, type the name of the device as you want to see it in Security Manager.
- In the Description box, type an optional description of the device being added.
- In the Management IP Address box, type the IP address of the device.
If SMC API was configured with a host name (instead of an IP address), it must also be configured in the Advanced section.
- In the Data Collector box, type the IP address of the data collector that will collect data from this device.
- In the Central Syslog Server box, type the syslog server from the list (optional).
Syslog fields are optional if the device uses the same IP for syslog and management.
A central syslog server is required only if syslog messages come from a different IP. A central syslog server must be created before it can be assigned to a device. To track usage via syslog, the device must support Level 3+.
- In the Syslog Match Names box, type the syslog match names (optional). You can enter multiple names separated by a comma.
- By default, the Automatically Retrieve Configuration check box is selected.
- In the External ID box, type a unique identifier to be used when the device identifier is different than what is displayed in Security Manager.
- For Collection Configuration, enable Update Rule Documentation on Member Devices to allow Rule Documentation fields on member devices to inherit a value from the management station. Any management stations Rule Documentation field updates will override updates on the member device. A rule marked to be removed will not be updated.
- Device Settings section.
Retrieval
- By default, the Protocol for retrieval is HTTPS, and the Port is 8082.
- For Domain, leave blank for a Shared Domain, otherwise enter a named domain.
Credentials
- Authentication Key—type the authentication key that you generated earlier.
- Re-enter Authentication Key—retype the key entered above.
- Retrieval section.
Scheduled Retrieval
Select the Enable Scheduled Retrieval check box to perform a retrieval at a set time regardless of change detection. This will activate additional fields to complete.
Set the Scheduled Retrieval Time to fit your requirements.
Select the Scheduled Retrieval Time Zone from the list.
Check for Change Retrieval
Select the Enable Check for Change check box to check for configuration changes after the specified interval and perform a retrieval if changes are detected. This will activate an additional field to complete.
The default Check for Change Interval time is 1440 minutes (every 24 hours). You can change the check interval time to best fit your requirements. The minimum required interval is 60 minutes (1 hour).
-
Advanced section.
- Select the Use Batch Config Retrieval check box only if you are manually sending configurations for this device using your data collector's batchconfig directory. While this option is enabled, online retrievals will be disabled. If enabled, the Management IP Address must be populated.
- If a host name was set for the SMC API host name (instead of an IP address), it must also be configured here. Enter the API Host Name if an API host name was specified in the SMC, if not leave this field blank.
- Select the Allow Weak SSL Keys check box to allow weak SSL encryption keys to be used by the SMC server during retrieval.
- Click Save.
- Devices being managed will be listed in the Discovered Devices section.