-
Notifications
You must be signed in to change notification settings - Fork 562
Firewall Integration Input Consistency #1878
Copy link
Copy link
Closed
Labels
8.3 candidate8.4-candidateEpicIntegration:Fortinet(Deprecated) Use one of the specific fortinet_X labels. [Integration not found in source](Deprecated) Use one of the specific fortinet_X labels. [Integration not found in source]Integration:checkpointCheck PointCheck PointIntegration:juniper_srxJuniper SRXJuniper SRXIntegration:panwPalo Alto Next-Gen FirewallPalo Alto Next-Gen FirewallIntegration:sophosSophosSophosTheme: just_ingest_itbugSomething isn't working, use only for issuesSomething isn't working, use only for issuesenhancementNew feature or requestNew feature or requestv8.3.0
Metadata
Metadata
Assignees
Labels
8.3 candidate8.4-candidateEpicIntegration:Fortinet(Deprecated) Use one of the specific fortinet_X labels. [Integration not found in source](Deprecated) Use one of the specific fortinet_X labels. [Integration not found in source]Integration:checkpointCheck PointCheck PointIntegration:juniper_srxJuniper SRXJuniper SRXIntegration:panwPalo Alto Next-Gen FirewallPalo Alto Next-Gen FirewallIntegration:sophosSophosSophosTheme: just_ingest_itbugSomething isn't working, use only for issuesSomething isn't working, use only for issuesenhancementNew feature or requestNew feature or requestv8.3.0
Type
Fields
Give feedbackNo fields configured for issues without a type.
We currently support several firewall integrations including Cisco, Palo Alto, Check Point and more. However, there are inconsistencies across the ingest options, such as supported protocols and syslog format (UDP/TCP/TCP+TLS) and syslog format (RFC3164 vs RFC5424). We need to ensure each integration is consistent across protocols and syslog format supported. Given how popular the firewall Beats modules are, we should consider enhancement to the modules as part of this effort too.
Cisco ASA/FTD/IOS
Check Point
Fortinet
Juniper SRX
Palo Alto
Sophos XG