Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Sample Syslog Server Configuration on a Linux System

 

Before you begin, the Linux-based syslog server must be configured with the IP address and gateway, and the StrongSwan IPsec client must be installed on the syslog server to initiate a VPN connection with the Junos OS device.

Note

The following procedure is just an example to show how to configure a syslog server on a Linux platform using the StrongSwan configuration to provide IPsec.

To setup a StrongSwan configuration on the remote syslog server to provide IPsec VPN capability:

  1. Modify the /etc/ipsec.secrets settings in accordance with the Junos OS device configuration.
  2. Modify the /etc/ipsec.conf settings in accordance with the Junos OS device configuration.
    Note

    Here conn home specifies the name of the IPSec tunnel connection to be established between a Junos OS device and Strongswan VPN Client on syslog server, ike=aes-sha256-modp2048 specifies the IKE encryption and authentication algorithms and DH Group to be used for the connection, andesp=aes128-sha1 specifies the ESP encryption and authentication algorithms to be used for the connection.

  3. Activate IPsec service by using ipsec up <being-established-ipsec-tunnel-name> command. For example,
  4. Restart the IPsec StrongSwan service.
  5. Check for syslog encrypted traffic.
  6. Copy /var/log/syslog to /var/tmp/syslog_verify file on the syslog server to validate the syslog from the Junos OS device.