Class 5 Lab 4 ‐ Search Events - Justin-Boyd/CIT-Class GitHub Wiki
Task: Configure Alert Forwarding
Step 1
- Start your pfSense virtual machine and then your Ubuntu virtual machine (log in to your user, not the testlog user).
Step 2
- Click Activities, search for terminal, and open it.
Step 3
- Use the command ip address and write down the machine's IP address
Step 4
sudo /opt/splunk/bin/splunk
- start to verify that the Splunk daemon is running.
Step 5
- Open the Firefox browser by clicking its icon in the menu on the left and browse to [Ip Address of pfSense] to access the pfSense management panel.
Step 6
- Click Advanced, and then Accepts the Risk and Continue.
Step 7
- Log in with the username admin and password Aa123456!
Step 8
- Click Status and then System Logs.
Step 9
- Click Settings, and select Enable Remote Logging towards the bottom of the page.
Step 10
- More options should appear below. Set the IP address of your Ubuntu machine with port 514, and select Everything for remote syslog contents.
- Then click Save at the bottom of the page.
- Note: This will enable remote logging in pfSense to forward log data to Splunk.
Step 11
- Open a new tab in the browser and browse to your Ubuntu's IP on port 8000. Sign in with user admin and password Aa123456!
Step 12
Step 13
- Scroll down and click Monitor.
Step 14
- Click TCP/UDP, and in the window that appears, click UDP and set the port to 514. Then click Next.
Step 15
- In the Input Settings window, click the Select Source Type drop-down menu, type snort, and select it. Then click Review.
Step 16
- Click Submit to finish the configuration, so that Splunk will listen to incoming log data.
Step 17
- In the terminal, run ping -c 5 8.8.8.8.
- The -c flag counts the number of packets to send.
Step 18
- In the Splunk web interface, click Apps and then Search & Reporting.
Step 19
- Type the query sourcetype="snort" AND 8.8.8.8, and click the search icon to search for the ping event.
- Note the logged information passed from Snort in pfSense.