Specifications
Monitor System Access and Performance
367
ProSAFE Gigabit Quad WAN SSL VPN Firewall SRX5308
How to Send Syslogs over a VPN Tunnel between Sites
To send syslogs from one site to another over a gateway-to-gateway VPN tunnel:
1. At Site 1, set up a syslog server that is connected to Gateway 1.
2. Set up a VPN tunnel between Gateway 1 at Site 1 and Gateway 2 at Site 2.
3. Change the remote IP address in the VPN policy on Gateway 1 to the W
AN IP address of
Gateway 2.
4. Change the local IP address in the VPN policy on Gateway 2 to the WAN IP address of
Gateway 2.
5. At Site 2, specify that Gateway 2 should send the syslogs to the syslog server at Site 1.
The following sections describe steps 2 through 4, using the topology that is described in the
following table:
Configure Gateway 1 at Site 1
To create a gateway-to-gateway VPN tunnel to Gateway 2, using the IPSec VPN wizard:
1. Select VPN > IPSec VPN > VPN Wizard
. The VPN Wizard screen displays.
2. Configure a gateway-to-gateway VPN tunnel using the following information:
• Connection name. Any name of your choice
• Pre-shared key.
Any key of your choice
• Remote WAN IP address. 10.0.0.2
• Local WAN IP address. 10.0.0.1
• Remote LAN IP Address. 192.168.20.0
• Remote LAN subnet mask. 255.255.255.0
3. Click Apply
to save the settings.
To change the remote IP address in the VPN policy:
1. Select VPN > IPSec VPN > VPN Policies. The VPN
Policy screen displays.
2. Next to the policy name for the Gateway 1–to–Gateway 2 autopolicy, click Edit
. The Edit
VPN Policy screen displays.
3. In the General section of the screen, clear the Enable NetBIOS check box.
Type of Address Gateway 1 at Site 1 Gateway 2 at Site 2
WAN IP address 10.0.0.1 10.0.0.2
LAN IP address 192.168.10.0
192.168.20.0
LAN subnet mask 255.255.255.0 255.255.255.0
LAN IP address syslog server 192.168.10.2 Not applicable