06-23-2004 07:53 AM - edited 02-20-2020 11:28 PM
I have a router to router VPN architecture, hub and spoke in design, with public addresses on the outside interfaces, and private addresses on the LAN side. I'd like to force all syslogs from the routers through the VPN tunnel to a privately addressed syslog server at the hub. What do you recommend?
thanks,
Louis
06-25-2004 05:57 AM
I have almost your exact situation running at a customer site: multiple remote sites to a central site, router to router VPN, syslog sent from the remote router to a central syslog server on the campus. I think the essential parts of what we did include:
- we specify the source address of the log message using "logging source-interface
- the ususal identification of the syslog server using "logging
- make sure that the routing logic on the router points the route to the syslog server through the VPN.
HTH. If you need anything else, post again.
Rick
06-25-2004 09:41 AM
Rick,
Thanks for the response. I have used the "logging source-interface
Louis
06-29-2004 11:37 AM
I'm doing similar - I just specify "logging 192.168.200.153", "logging trap informational", "logging source-interface loopback0" and "logging on" and it works like a dream.
Since syslog runs over UDP, you'll probably lose any messages such as VPN tunnels being torn down or reestablished so its not perfect, but it works fine for me.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide