ADC

Export syslog securely over SSL

You can securely export syslog over SSL (Secure Sockets Layer) ensuring that sensitive log data traverses the network in an encrypted and authenticated manner. By leveraging SSL, you can safeguard syslog transmissions against eavesdropping, tampering, and unauthorized access.

Export audit logs securely over an SSL connection by authenticating the syslog server

The following are the configuration steps to send audit logs securely over an SSL connection by authenticating the syslog server:

  1. Copy the CA certificate. CA certificate is the certificate issued to the syslog server by the Certificate Authority. The certificate is available in the /nsconfig/ssl folder.

    1. Run the following command on the certificate:

      openssl x509 -noout -hash -in <ca_certificate>
      <!--NeedCopy-->
      

      The result is a hash (for example 6d2962a8), a series of alphanumeric characters based on the Distinguished Name of the certificate.

    2. Run the following command to create a symbolic link to the certificate that uses the hash returned by the previous command and the .0 suffix.

      ln -s <ca_certificate> 6d2962a8.0
      <!--NeedCopy-->
      
  2. Enable load balancing and SSL features.

    enable ns feature LoadBalancing
    enable ns feature SSL
    <!--NeedCopy-->
    
  3. Add an SSL cert key by giving the CA certificate path.

    add ssl certkey server_cacert -cert <path_to_ca_cert>
    <!--NeedCopy-->
    
  4. Add a service of type SSL_TCP with the IP address of the syslog server and the port on which the syslog server listens for SSL packets.

    add service syslog_service <syslog_server_ip> SSL_TCP <syslog_server_port>
    <!--NeedCopy-->
    
  5. Bind the cert key to the service by giving the option -CA.

    bind ssl service syslog_service -certkeyName server_cacert -CA
    <!--NeedCopy-->
    
  6. Enable the server authentication in the service.

    set ssl service syslog_service -serverAuth ENABLED
    <!--NeedCopy-->
    
  7. Add a load balancing virtual server of type TCP with an IP address and port 514. Add SNIP address in the load balancing virtual server IP’s subnet.

    add lb vserver lb_vserver TCP <lb_vserver_ip> 514
    add ns ip <IP> <subnet> -type SNIP
    <!--NeedCopy-->
    
  8. Bind the service to the load balancing virtual server.

    bind lb vserver lb_vserver syslog_service
    <!--NeedCopy-->
    
  9. Add syslog action with the IP address as load balancing virtual IP address, port number as 514 and transport as TCP.

    add syslogaction sys_act <lb_vserver_ip> -loglevel all -transport TCP -serverPort 514
    <!--NeedCopy-->
    
  10. Add syslogpolicy and bind the policy to system global.

    add syslogpolicy sys_pol true sys_act
    bind syslogglobal -policyname sys_pol -priority 1
    <!--NeedCopy-->
    

Export audit logs securely over SSL connection through mutual authentication

The following are the configuration steps to send audit logs securely over SSL connection through mutual authentication:

  1. Copy the CA certificate. CA certificate is the certificate issued to the syslog server by the Certificate Authority. The certificate is available in the /nsconfig/ssl folder.

    1. Run the following command on the certificate:

      openssl x509 -noout -hash -in <ca_certificate>
      <!--NeedCopy-->
      

      The result is a hash (for example 6d2962a8), a series of alphanumeric characters based on the Distinguished Name of the certificate.

    2. Run the following command to create a symbolic link to the certificate that uses the hash returned by the previous command and the .0 suffix.

      ln -s <ca_certificate> 6d2962a8.0
      <!--NeedCopy-->
      
  2. Add the SSL cert key by giving the CA certificate path.

    add ssl cert key server_cacert -cert <path_to_ca_cert>
    <!--NeedCopy-->
    
  3. Add the SSL cert key by giving the client certificate (NetScaler’s certificate) with the key.

    add ssl certkey client_cacert -cert <path_to_client_cert> -key <path_to_client_key>
    <!--NeedCopy-->
    
  4. Add service of type SSL_TCP with the IP address of syslog server and the port on which the syslog server listens for SSL packets.

    add service syslog_service <syslog_server_ip> SSL_TCP <syslog_server_port>
    <!--NeedCopy-->
    
  5. Bind the cert key (server) to the service by giving the option -CA.

    bind ssl service syslog_service -certkeyName server_cacert -CA
    <!--NeedCopy-->
    
  6. Bind the cert key (client) to the service.

    bind ssl service syslog_service -certkeyName client_cacert
    <!--NeedCopy-->
    
  7. Enable the server authentication in the service.

    set ssl service syslog_service -serverAuth ENABLED
    <!--NeedCopy-->
    
  8. Add load balancing virtual server of type TCP with an IP address and port 514. Add SNIP address in the load balancing virtual server IP’s subnet.

    add lb vserver lb_vserver TCP <lb_vserver_ip> 514
    <!--NeedCopy-->
    
  9. Bind the service to a load balancing virtual server.

    bind lb vserver lb_vserver syslog_service
    <!--NeedCopy-->
    
  10. Add syslog action with the IP address as load balancing virtual IP address, port as 514 and transport as TCP.

    add syslogaction sys_act <lb_vserver_ip> -loglevel all -transport TCP -serverPort 514
    <!--NeedCopy-->
    
  11. Add syslog policy and bind this policy to system global.

    add syslogpolicy sys_pol true sys_act
    bind syslogglobal -policyname sys_pol -priority 1
    <!--NeedCopy-->
    

With this configuration, SYSLOGTCP connection gets established from NetScaler’s IP address (NSIP) to load balancing virtual server’s IP address (LB VIP) and SSL_TCP connection gets established from Subnet IP(SNIP) of NetScaler to the back end syslog server. The audit log messages are then sent to syslog server over the SSL_TCP connection.

Export syslog securely over SSL