Passive Syslog Listener

Top  Previous  Next

The Passive Syslog Listener Service is basically a TCP based Listener Service that sends messages from a Syslog Queue to any remote host, that connects to it. Connections can be secured with TLS including certificate based authentication. A preconfigured greating and response message may also be configured.

 

services_040

Syslog Server Properties

 

 

Internet Protocol Type

 

Select the desired protocol type. IPv4 and IPv6 are available. The IPv6 protocol needs to be properly installed in order to be used. Note that one Service can only handle IPv4 or IPv6, so if you want to use both protocols, you will need to create two separate services.

 

 

 

Protocol Type

 

Currently only TCP is supported for the Passive Syslog Listener.

 

 

IP Address

 

The Syslog Server can now be bound to a specific IP Adress. You can either use an IPv4, an IPv6 Address or a Hostname that resolves to an IPv4 or IPv6 Address. This feature is useful for multihome environments where you want to run different Syslog Servers on different IP Addresses. Please note that the default IP Address 0.0.0.0 means ANY IPv4 Address and "::" means all available IPV6 Addresses..

 

 

Listener Port

 

The port the Syslog server listens on. The typical (standard) value is 514. This should be changed only if there is a definite need for it. Such a need typically arises from security concerns. If the port is changed, all reporting devices (routers, printers …) must also be configured to use the non-standard port.

 

 

General Options

 

SyslogQueue Name

 

Selects the SyslogQueue to be used by this Service. Must be set to a valid

SyslogQueue. See SyslogQueue Action for more about Syslog Queues.

 

 

Session Timeout

 

One of the TCP-specific options is the session timeout. This value declares, how long a TCP session may be kept open, after the last package of data has been sent. You can by default set values between 1 second and 1 day. Or you can use a custom value with a maximum of 2147483646 milliseconds. If you wish to disable the session timeout, you can use a custom value of 0 milliseconds to disable it.

 

 

Message separation sequence

 

This determines, how you want to separate the messages. By default "\r\n" is the value for this, as most times a message ends with a carriage return and/or a line feed. But, you can choose your own separation sequence here as well.

 

 

Enabled communication

 

Activate this setting when you want to Send and Receive an expected

message after the connection is established.

 

 

Message to Send

 

Defines the message send to the Client after the connection is

established. The Passive Syslog Listener will close the connection if the

message does not match.

 

 

Expected Message

 

Defines the message to be expected from the Client after our message was

send. The Passive Syslog Listener will close the connection if the message

does not match.

 

 

Syslog TLS

 

services_041

SSL/TLS Options

 

Enable SSL / TLS Encryption

 

This option enables SSL / TLS encryption for your syslog server. Please note, that with this option enabled, the server only accepts SSL / TLS enabled senders.

 

 

TLS Mode

 

The TLS mode can be set to the following:

 

Anonymous authentication

Default option, which means any client certificate will be accepted, or even none.

 

x509/name (certificate validation and name authentication)

When this mode is selected, the subject within the client certificate will be checked against der permitted peers list. This means the Syslog Server will only accept the secured connection if it finds the permitted peer in the subject.

 

509/fingerprint (certificate fingerprint authentication)

This mode creates a SHA1 Fingerprint from the client certificate it receives, and compares it to fingerprints from the permitted peers list. You can use the debuglog to see fingerprints of client certificates which were not permitted.

 

x509/certvalid (certificate validation only)

A Syslog Sender is accepted when the client certificate is valid. No further checks are done.

 

Select common CA PEM

 

Select the certificate from the common Certificate Authority (CA), the syslog receiver should use the same CA.

 

Select Certificate PEM

 

Select the client certificate (PEM Format).

 

Select Key PEM

 

Select the keyfile for the client certificate (PEM Format).

 

Permitted Peers

This list contains all permitted peers. If x509/name is used, this can contain parts of the client certificate subject. For example if you have CN = secure.syslog.msg in the certificate subject, you can add "secure.syslog.msg" as permitted peer. When using x509/fingerprint, this list holds a list of permitted SHA1 fingerprints. The fingerprints can either be generated with OpenSSL Tools, or grabbed from the debug logfile. The format is like described in RFC 5425, for example: "SHA1:2C:CA:F9:19:B8:F5:6C:37:BF:30:59:64:D5:9A:8A:B2:79:9D:77:A0".

 

 

"Test Passive Syslogserver" Button

 

A new Window opens which will help you testing the Passive Syslogserver.

Make sure the Service is started (Or restarted) after you finished

configuration of the Passive Syslog Listener. The Testwindow will

automatically be filled with correct properties and is ready to go. If the

test succeeds, the datagrid should rapidly fill with queued syslog

messages.

 

 

 

Please Note

 

Updated the OpenSSL components and libraries with the latest Version  openssl-1.0.1j.