Encrypt Syslog Audit Data
Syslog audit data, such as messages and traps, are usually sent unencrypted between a GigaVUE node and the syslog server using UDP over port 514. The messages are sent in plain text. To allow secure transmission, starting in software version 4.4, you can send encrypted syslog audit data by using TCP and SSH options.
For more information on the CLI commands used in the following section, refer to logging and ssh in the reference section.
Encryption Procedure
Use the following sample procedure to encrypt syslog audit data.
Step |
Description |
Command |
|||||||||
Configure TCP Port |
|||||||||||
|
On the GigaVUE node, configure the TCP port on which the syslog server listens. Note: Starting in software version 4.7, use the logging command to specify an IPv4 address, an IPv6 address, or a hostname. |
(config) # logging 192.168.1.25 tcp 51300 |
|||||||||
Generate Public Key |
|||||||||||
|
On the GigaVUE node, generate a public key for a user account on the node. If the user has the admin role, you must use the default admin account to generate the public key. |
(config) # ssh client user admin identity rsa2 generate |
|||||||||
|
On the GigaVUE node, display the key contents, then copy the key contents. |
(config) # show ssh client For example, copy all of the key contents: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCZfGVW4+2S9Lng1Jo5lM7jJdnU93N4i ... grneMozmTIvJgB3vfV |
|||||||||
Login to Server to Paste the Key |
|||||||||||
|
In Linux, log into the syslog server. In the following example, the IP address of the syslog server is 192.168.1.25 and the username is an existing user called sysloguser. |
Log into IP address 192.168.1.25 with username sysloguser to see the Linux prompt: # |
|||||||||
|
On the syslog server, change the directory to .ssh. |
# cd .ssh |
|||||||||
|
On the syslog server, edit the authorized_keys file, located in the .ssh directory, using any editor, then paste the key contents. |
For example, using the vi editor: # vi authorized_keys Paste the key contents that you copied in the previous step into the authorized_keys file in the following format <copied public key> <space> username@hostname. NOTES:
# vi authorized_keys
# chmod 644 authorized_keys |
|||||||||
|
Change the access on the authorized_keys file back to secure. |
# chmod 600 authorized_keys |
|||||||||
Configure Secured TCP Connection |
|||||||||||
|
On the GigaVUE node, configure the secured TCP connection. |
(config) # logging 192.168.1.25 tcp 51300 ssh username sysloguser |
|||||||||
|
On the GigaVUE node, display the configuration. |
(config) # show logging |