This article describes how to send syslogs to a GMS Server over the WAN (HTTPS/SSL management method).
Sending Syslogs to a GMS Server on the WAN.
For this article, we’ll be using the following IP addresses as examples to demonstrate the NAT policy, Access Rule and GMS configuration. You can use these examples to configure the GMS, substituting your IP addresses for the examples shown here:
NSA 2400
WAN (X1): 2.2.2.2
GMS Server IP Address: 192.168.20.2
NSA 240
WAN (X1) : 3.3.3.3
In this scenario we will add a remote SonicWall (NSA 240) located on the WAN to a GMS server located behind a SonicWall NSA 2400.
Before beginning the configuration, ensure the following are in place:
Once the above requirements have been met, follow the configuration process as under:
NSA 2400 Configuration
In this section we illustrate the configuration required in the NSA 2400
Creating Address Objects.
Create the following Access Rule to allow Syslog traffic from the NSA 240 and NAT Policy to forward it to the GMS Server.
|
|
|
|
NSA 240 Configuration In this section we illustrate the configuration required in the NSA 240.
Login to the GMS server and add the NSA 240 as under:
Do a packet capture on the NSA 240 with the destination IP address as the WAN IP of the NSA 2400 and the destination port as 514. If able to see outgoing traffic, then the settings in the NSA 240 are configured properly. If unable to see outgoing Syslog traffic, check the following:
If able to see outgoing Syslog traffic in the NSA 240 but the GMS server is not able to synchronize with the units or create reports, check the following:
|