Configuring Event Logging for Junos OS in FIPS Mode
The system log (syslog) files record system events in Junos OS.
Because of the sensitive nature of information used to configure and operate a system running Junos OS in FIPS mode, we recommend that you as Crypto Officer log certain events and examine the logs frequently.
For Junos OS in FIPS mode, we recommend that you as Crypto Officer configure the system log to record the following events. You can log more types of information, but these events are particularly important to the Junos OS in FIPS mode environment.
All authorization events—stored in
/var/log/authlog
and/var/log/auditlog
All interactive commands and configuration change events, including secrets—stored in
/var/log/auditlog
All events of moderate severity—stored in
/var/log/messages
In Junos OS in FIPS mode, the actual secrets themselves
are not logged. When Junos OS encounters secret information that it
would ordinarily log, it replaces the secrets with the token /* SECRET-DATA */
. For example, a secret string entered
as part of the command line is not logged, but is replaced with the
following token:
Feb 10 23:57:01 shmoo mgd[15558]: UI_CFG_AUDIT_SET_SECRET: User 'root' set: [system tacplus-server 172.17.12.120 secret] Feb 10 23:57:01 shmoo mgd[15558]: UI_CMDLINE_READ_LINE: User 'root', command 'set system tacplus-server frodo secret /* SECRET-DATA */ '
The following system log configuration is recommended for Junos OS in FIPS mode:
You can configure the system to log events to a local file or to a remote server:
Configuring Event Logging to a Local File
To configure the system to store the recommended information for Junos OS in FIPS mode, you create log files on the router called authlog, auditlog, and messages.
(You can also store event logs on a secure, remote server. For details, see Configuring Event Logging to a Remote Server.)
To configure the system to log the recommended events
to local files on the router in the /var/log/
directory:
- Log in to the router with your Crypto Officer password
if you have not already done so, and enter configuration mode:crypto-officer@host:fips> configure
[edit]
crypto-officer@host:fips# - Configure a file named authlog to store informational
messages from the authorization system in
/var/log/authlog
on the router:[edit]
crypto-officer@host:fips# set system syslog file authlog authorization info - Configure a file named auditlog to store informational
messages from the authorization system, all configuration changes,
and all commands entered through the CLI—including secrets—in
/var/log/auditlog
on the router:[edit]
crypto-officer@host:fips# set system syslog file auditlog authorization info[edit]
crypto-officer@host:fips# set system syslog file auditlog change-log any[edit]
crypto-officer@host:fips# set system syslog file auditlog interactive-commands any - Configure a file named messages to store notices
of all events of moderate severity in
/var/log/messages
on the router:[edit]
crypto-officer@host:fips# set system syslog file messages any any - If you are finished configuring the router, commit the
configuration and exit:[edit]crypto-officer@host:fips# commit
commit complete
crypto-officer@host:fips# exitcrypto-officer@host:fips> exit
To view the contents of the log files, enter the following operational mode commands:
crypto-officer@host:fips> file show /var/log/authlog
crypto-officer@host:fips> file show /var/log/auditlog
crypto-officer@host:fips> file show /var/log/messages
Configuring Event Logging to a Remote Server
In addition to storing log files in the local /var/log/
directory on the router (see Configuring Event Logging to a Local File), you can export the information
in system log files to a secure, remote server.
We recommend that you store system log files remotely.
To configure the system to log the recommended events to a remote host:
- Log in to the router with your Crypto Officer password
if you have not already done so, and enter configuration mode:crypto-officer@host:fips> configure
[edit]
crypto-officer@host:fips# - Configure the system to import informational messages
from the authorization system and store them on a remote host—for
example, a host named Secure-Audit-Server:
[edit]
crypto-officer@host:fips# set system syslog host Secure-Audit-Server authorization info - Configure the system to import all configuration changes
and all commands entered through the CLI—including secrets—and
store them on the remote host Secure-Audit-Server:
[edit]
crypto-officer@host:fips# set system syslog host Secure-Audit-Server change-log any[edit]
crypto-officer@host:fips# set system syslog host Secure-Audit-Server interactive-commands any - Configure the system to import all notices of events of
moderate severity and store them on the remote host Secure-Audit-Server:
[edit]
crypto-officer@host:fips# set system syslog host Secure-Audit-Server any notice - If you are finished configuring the router, commit the
configuration and exit:[edit]crypto-officer@host:fips# commit
commit complete
crypto-officer@host:fips# exitcrypto-officer@host:fips> exit
Related Documentation
For more information about system logging, see the Junos OS System Basics Configuration Guide.