How to get a secured connection between the Log Exporter and the syslog server.
The only allowed authentication method via TLS is mutual authentication. For mutual authentication, Log Exporter needs these certificates:
If you do not already have the required certificates, this procedure is an example of how to create the required certificates. There are also alternative procedures.
All commands need to run on the CA server.
Note - The CA server needs to be routable from the Log Exporter device.
To create a self signed CA:
Run this if you do not already have a trusted CA pem:
openssl genrsa -out RootCA.key 2048
openssl req -x509 -new -nodes -key RootCA.key -days 2048 -out RootCA.pem
An example of the prompt to provide information:
---
Country Name (2 letter code) [AU]:US
State or Province Name (full name) [Some-State]:New York
Locality Name (eg, city) []:MyCity
Organization Name (eg, company) [Internet Widgits Pty Ltd]:MyCompany
Organizational Unit Name (eg, section) []:MyDepartment
Common Name (e.g. server FQDN or YOUR name) []:www.company.com
Email Address []:
To create a client (log_exporter) .p12 certificate file:
openssl genrsa -out log_exporter.key 2048
openssl req -new -key log_exporter.key -out log_exporter.csr
openssl x509 -req -in log_exporter.csr -CA RootCA.pem -CAkey RootCA.key -CAcreateserial -out log_exporter.crt -days 2048 -sha256
openssl pkcs12 -inkey log_exporter.key -in log_exporter.crt -export -out log_exporter.p12
Note - The challenge phrase used in this conversion is required in the log_exporter
TLS configuration.
After you create the required certificates, update the security parameters on the Check Point exporting server:
To update the security parameters:
mdsenv
<domain server name or ip>
cd $EXPORTERDIR/targets/
<deployment name>
mkdir certs
RootCA.pem
and log_exporter.p12
to the certs directoryRootCA.pem
and log_exporter.p12
execution privilegeschmod +r RootCA.pem
chmod +r log_exporter.p12
targetConfiguration.xml
file with the full path to the certificates and the challenge phrase used to create the .p12 certificateTo create a server (target) certificate:
openssl genrsa -out syslogServer.key 2048
openssl req -new -key syslogServer.key -out syslogServer.csr
openssl x509 -req -in syslogServer.csr -CA RootCA.pem -CAkey RootCA.key -CAcreateserial -out syslogServer.crt -days 2048 -sha256