Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

How can I send Syslogs to a Analyzer server through a Site to Site VPN Tunnel?

03/26/2020 34 People found this article helpful 101,412 Views

    Download
    Print
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description

    Analyzer: How to Send Syslogs to a Analyzer Server through a Site to Site VPN Tunnel (5.9 & above).

    Sending Syslogs to a Analyzer Server through Site to Site VPN
    Image

    NSA 2400

    LAN Interface (X0): 192.168.1.1 Mask: 255.255.255.0

    Analyzer Server IP Address: 192.168.1.20

    NSA 240

    LAN Interface (X0):192.168.2.1 Mask: 255.255.255.0

    Scenario:

    In this scenario we will add two units in the Analyzer server.

    1. A local SonicWall NSA 2400 UTM device.
    2. A remote SonicWall NSA 240 UTM device connected over a site to site VPN between the NSA 240 and NSA 2400.

    Requirements:

    Before beginning the configuration, ensure the following are in place:

    1. Thesite to site VPN tunnel is upand you are able to reach the analyzer server from NSA 240 device.
    2.   Both of the units are licensed for analyzer
    3. HTTPand / or HTTPS Management is enabled on the LAN interface of NSA 2400 device
    4. HTTP and / or HTTPS Management is enabled on the VPN policy

    Resolution

    NSA 2400 configuration

    •  Navigate to Network | Address Objects, Click on Custom Address objects radio button at top of the screen in View Style.
    •  Click on Add button under Address Objects, to get Add Address Object Window. Create address object for Syslog server IP address as below

       Name: Syslog Server Any Friendly Name you would like to give)
       Zone : LAN
       Type : Host
       IP Address: 192.168.1.20 (IP Address of Syslog Server)
       Click Add button after typing the information to create object.Image

    • Navigate to Logs | Syslog page.
    •  Click on Add under syslog server and enter the following information.

       Name or IP address: Select Syslog server from drop down list (Address Object which is created for syslog server)
       Port: 514
      Image

    • Navigate to the Log-|Settings.
    • Select the Logging level to Inform (recommended) or Debug from the drop down list.
    •  In order to send syslogs for all the categories, change this syslog option to full green.
      Image

    •   To send syslogs for specific categories, manually enable the syslog logging.
      Image 

    • Then click on Apply to save these settings.

     

    NSA 240 configuration

    • Login to the SonicWall management GUI.
    •  Navigate to the VPN | Settings page.
    •  Click the Configure button to edit the VPN Policy already created.
    •  In the Advanced tab of the VPN Policy window, enable HTTP and / or HTTPS under Management via this SA.
    •  Click on OK to save.

      NOTE: This may re-negotiate the tunnel.


      Image

    • Navigate to Network | Address Objects, Click on Custom Address objects radio button at top of the screen in View Style.
    • Click on Add button under Address Objects, to get Add Address Object Window. Create address object for Syslog server IP address as below.

      Name: Syslog Server (Any Friendly Name you would like to give)
      Zone: VPN
      Type: Host
      IP Address : 192.168.1.20 (IP Address of Syslog Server Which is on remote Site)

    • Click Add button after typing the information to create object.
      Image

    • Navigate to Logs | Syslog page.
    • Click on Add under syslog server and enter the following information.

      Name or IP address: Select Syslog server from drop down list (Address Object Which is created for syslog server)
      Port: 514
      Local interface: X0
      Outbound Interface: Select the Site to Site VPN tunnel name
      Image

     

    Analyzer Configuration:

    • Login to the Analyzer server and add the NSA 2400 and NSA 240 units as under:
      Image


    Troubleshooting:

    • Do a packet capture on each SonicWall with the destination IP address as 192.168.1.20 and the destination port as 514. If able to see outgoing traffic, then the units are configured properly.
    • If unable to see outgoing Syslog traffic, check the following:
    1.  In the Log | Syslog page of both the devices, check whether the Server IP is correct. Make sure Server port is 514.
    2.  In the the Log | Settings page of each unit, make sure the Logging Level is set to Inform (recommended) or Debug. Make sure all necessary Syslogs categories are checked.
    3.  Make sure HTTP / HTTPS Management is enabled on the LAN interface of each unit.
    4.  In the NSA 240 make sure HTTP / HTTPS is checked under Management via this SA in the Advanced tab of the VPN Policy.
    5.  Make sure there are no Access Rules or Security Services blocking UDP port 514.

    If able to see outgoing Syslog traffic in the UTM devices but the Analyzer server is not able to synchronize with the units or create reports, check the following:

    1.  Make sure there are no intermediate devices between the SonicWalls and the Analyzer server blocking traffic.
    2.  Make sure the units added under Analyzer have the correct Serial Number, IP Address, Login Name, Password and HTTPS Port number.
    3.  Disable (or add appropriate exception in) Windows Firewall or any other security application which could possibly block Syslog traffic

    Related Articles

    • 2FA authentication error using TOTP "Please try again later"
    • Methods to add Address Objects
    • Configure probe monitoring for WAN Failover and load balancing

    Categories

    • Firewalls > SonicWall SuperMassive 9000 Series > VPN
    • Firewalls > SonicWall NSA Series > VPN
    • Firewalls > TZ Series > VPN
    • Management and Reporting > Analyzer > Syslog

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2022 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
      Scroll to top
      Trace:8aab0ed913a2dfc0ab0713be2a845ae2-92