Forwarding Log Files to an External Linux Server

Note: Only one external server is supported by Netvisor ONE.

You can forward log files to an external Linux server and encrypt them using Transport Layer Security (TLS) over Transmission Control Protocol (TCP).

The command, admin-syslog-create accepts a new parameter, transport tcp-tls|udp, to add TLS encryption and you can specify a port number for TCP.

CLI network-admin@Leaf1 > admin-syslog-create name audit-logs scope local host transport tcp-tls port 10514


You can create TLS certificates using the following command:

CLI network-admin@Leaf1 > syslog-tls-cert-request-create country US state CA city Palo Alto organization QA organizational-unit engineering common-name


This command creates a Certificate Signing Request (CSR) and places it in the directory /sftp/export used by Netvisor One. You must copy and the CSR to the CA server and sign it.

To import the signed certificate to Netvisor One, you must copy the certificate and the ca.pem file to /sftp/import directory in Netvisor One.

Use the following command to import the files:

CLI network-admin@Leaf1>syslog-tls-cert-import file-ca ca.pem file-cert my-cert.pem


To enable TLS-TCP logging export, use the following syntax:

CLI network-admin@Leaf1>admin-syslog-create name audit-logs scope local host transport tcp-tls port 10514

To display the export information, use the admin-syslog-show command:

CLI network-admin@Leaf1>admin-syslog-show

switch     name      scope    host         port     transport      message-format

-------    --------  ------   -----------  -----    ---------      --------------

leaf-pst-1 MYTLS     local 10514    tcp-tls        legacy


Other new commands

syslog-tls-cert-clear               Clears the certificates

syslog-tls-cert-request-show        Displays the certificate information

syslog-tls-cert-show                Displays syslog TSL import certificate config