Configure Audit Log Options in FIPS Mode
Learn to configure audit log options on your device in FIPS mode.
Audit Log Options refer to the settings and configurations available for managing and maintaining audit logs within a system. Audit logs are records that document various activities, changes, and events that occur within a system, providing a trail that can be used for security, compliance, and troubleshooting purposes.
Configure Audit Log Options on Your Device in FIPS Mode
To configure audit log options on your device in FIPS mode:
Sample Code Audits of Configuration Changes
The following sample code audits all changes to the configuration secret data and sends the logs to a file named Audit-File.
[edit system] syslog { file Audit-File { authorization info; change-log info; interactive-commands info; } }
This sample code expands the scope of the minimum audit to audit all changes to the configuration, not just secret data, and sends the logs to a file named Audit-File.
[edit system] syslog { file Audit-File { any any; authorization info; change-log any; interactive-commands info; kernel info; pfe info; } }
Example: System Logging of Configuration Changes
This example shows a sample configuration and makes changes to users and secret
data. It then shows the information sent to the audit server when the secret
data is added to the original configuration and committed with the
load
command.
[edit system] location { country-code US; building B1; } ... login { message "UNAUTHORIZED USE OF THIS ROUTER\n\tIS STRICTLY PROHIBITED!"; user admin { uid 2000; class super-user; authentication { encrypted-password “$ABC123”; # SECRET-DATA } } } radius-server 192.0.2.15 { secret “$ABC123” # SECRET-DATA } services { ssh; } syslog { user *{ any emergency; } file messages { any notice; authorization info; } file interactive-commands { interactive-commands any; } } ... ...
The new configuration changes the secret data configuration statements and then adds a new user.
security-administrator@host:fips# show | compare [edit system login user admin authentication] – encrypted-password “$ABC123”; # SECRET-DATA + encrypted-password “$ABC123”; # SECRET-DATA [edit system login] + user admin2 { + uid 2001; + class operator; + authentication { + encrypted-password “$ABC123”; # SECRET-DATA + } + } [edit system radius-server 192.0.2.15] – secret “$ABC123”; # SECRET-DATA + secret “$ABC123”; # SECRET-DATA