Device | Details |
---|---|
Vendor | Shorewall |
Device Type | Firewall |
Connection Type | Syslog |
Data Source Name | Shorewall |
Data Source ID | 1877 |
Open the /etc/shorewall/shorewall.conf
file for editing and configure the IP_FORWARDING=[On|Off|Keep]
parameter. This parameter determines whether the Shorewall Firewall enables or disables IPV4 Packet Forwarding (turn it over). Possible parameter settings are:
IP_FORWARD=On
is assumed.
Configure rsyslog to send Shoewall log data to Sheriff CSM as shown in the following code sample. .
*.* @@<Sheriff_CSM_IP>:514</p> # if you need to forward to other systems as well, just # add additional config lines: *.* @@other-server.example.net:10514 # Log anything (except mail) of level info or higher. # Don't log private authentication messages! *.info;mail.none;authpriv.none;cron.none /var/log/messages # The authpriv file has restricted access. authpriv.* /var/log/secure # Log all the mail messages in one place.now mail.* /var/log/maillog # Log cron stuff cron.* /var/log/cron # Everybody gets emergency messages *.emerg * # Save news errors of level crit and higher in a special file. uucp,news.crit /var/log/spooler # Save boot messages also to boot.log local7.* /var/log/boot.log
In this example, we forward all messages to the remote system. By applying different filters, however, you can choose to forward only select entries to the remote system. Note that you can also include as many forwarding actions as you like. For example, if you want to configure a backup central server, you can simply forward log data to both the remote system, and the backup central server, using two different forwarding lines.