Skip to content

Security Logging (Syslog Collector)

RansNet devices provide comprehensive support for security and audit logging via the standard Syslog protocol. Syslogs are classified by severity (Emergency, Alert, Critical, Error, Warning, Notice, Informational, Debug) and facility type, making it easy to filter and route logs based on source and importance.

Many regulations—including Sarbanes-Oxley Act, PCI DSS, and HIPAA—require organizations to collect, store, and analyze logs from all security-relevant systems. This document explains how RansNet devices can function as either syslog clients (sending logs) or syslog collectors (receiving and storing logs from other devices).


Overview

RansNet devices support two deployment modes for security logging:

Mode Role Devices Purpose
Syslog Client Exports logs CMG, HSA, UA, XE, UAP, HSG Send locally generated logs to a central collector or external syslog server
Syslog Collector Receives & stores logs HSG, mlog series (LOG-500, LOG-1000, LOG-2000) Centralize logs from multiple devices; parse and archive in SQL database

Log Types Supported

RansNet devices generate the following log types:

Log Type Source Content Auto-Enabled
Firewall Access Firewall engine Permit/deny decisions, packet details (source, destination, protocol, port) Manual (firewall-access rules)
DNS Query DNS resolver Domain resolution requests (client IP, domain, record type) Yes (default)
DHCP DHCP server Device registration events (IP assignment, MAC address, hostname) Yes (default)
RADIUS Authentication (HSG only) User sessions (username, MAC, IP, start/end time, traffic volume) Yes (HSG only)
CLI Command CLI shell Administrator commands executed Manual (logging rules)

Requirements

Before configuring security logging, ensure:

  • Firewall access logging: At least one firewall-access rule configured on the device (on-device logging)
  • Syslog export: UDP/514 open between the device and syslog collector (verify with firewall-input rules on collector)
  • Syslog collector: HSG or mlog appliance with sufficient disk space (minimum 10GB for ~90 days of logs)
  • Compliance: Understand local data retention regulations (many countries require 90+ days of firewall/URL logs)

Part 1: Configure Syslog Client (Export Logs)

Devices export logs by enabling firewall logging and defining log export rules.

Step 1: Enable Firewall Logging

GUI Configuration

Navigate to Device Settings → Security → Firewall Policies. For each rule you want logged, set the Action to one of:

Action Behavior
permit-log Allow traffic and log matching packets
deny-log Block traffic and log matching packets

CLI Configuration

Use firewall-access rules to log packets passing through the device:

firewall-access 100 permit-log inbound eth0 tcp dport 80 remark "Log HTTP"
firewall-access 101 deny-log inbound eth0 tcp dport 22 remark "Log SSH blocks"

For HSG/HSA (Hotspot Instances):

HSG and HSA maintain separate firewall rules for each hotspot instance. Enable logging per instance:

hotspot-access 100 permit-log inbound tun+ tcp dport 443 remark "Log HTTPS from hotspot"

View Local Logs

To troubleshoot locally, view real-time logs from the CLI:

mbox# show logging system
Info: showing system local logs. use CTL+C to stop
Oct 14 23:22:06 mbox kernel: [3964398.563219] mboxfw-permit:IN=eth0 OUT= SRC=10.99.1.3 DST=10.65.19.9 PROTO=TCP SPT=50467 DPT=22

Note

The show logging system command displays real-time logs only, useful for troubleshooting. RansNet does not retain historical local logs. For persistent logging, configure export rules (Step 2) to send logs to an external collector.

Step 2: Configure Log Export Rules

Define rules to export logs to a syslog collector or external server. Rules are evaluated top-down; the first match applies.

CLI Configuration

ip logging <rule-number> host <collector-ip> <filter-type>

Filter Options:

Filter Syntax Purpose
msg <text> ip logging 10 host 49.128.58.68 msg mboxfw Match logs containing specific text (e.g., firewall logs)
tag <tag> ip logging 11 host 49.128.58.68 tag unbound Match by syslog tag (e.g., DNS logs from unbound)
fac <facility> ip logging 10 host 49.128.58.68 fac local1 Match logs from specific facility (HSA/branch series only)
prio <priority> ip logging 10 host 49.128.58.68 prio ALERT Match by severity level
all ip logging 20 host 49.128.58.68 all Export all logs (useful for initial setup)

Example 1: Gateway Series (CMG/HSG)

!
ip logging 10 host 49.128.58.68 msg mboxfw
ip logging 11 host 49.128.58.68 tag unbound
ip logging 12 host 49.128.58.68 tag dhcp
ip logging 13 host 49.128.58.68 tag radius
ip logging 20 host 49.128.58.68 tag klish
!

Example 2: Branch Series (HSA/UA/XE/UAP)

Branch series supports facility-based filtering only:

!
ip logging 49.128.58.66 level 6
!

Warning

Once a device is configured as a syslog client (log export rules defined), matched logs are sent to the collector and no longer available locally. If you need to retain local logs on HSG for offline access, do NOT configure export rules—instead, use the GUI Log Collector feature to store logs on the device itself.

Verification

Test Command Expected Outcome
Firewall rules configured show firewall-access Lists rules with permit-log or deny-log actions
Debug syslogs tcpdump interface eth0 port 514 detail See if any syslog packets are sent to collector IP
Logs being exported Monitor on collector via GUI Live logs tab shows incoming messages from this device

Part 2: Configure Syslog Collector (Receive Logs)

HSG and mlog appliances can receive and store logs from other devices via UDP/514 (syslog protocol).

Step 1: Configure Firewall Rules

Allow incoming syslog traffic (UDP/514):

firewall-input 101 permit inbound eth0 udp dport 514 remark "permit incoming syslogs"
firewall-input 102 permit inbound eth0 tcp dport 443 remark "permit local GUI via https"

Step 2: Configure Log Collector (SQL Database & Rules)

CLI Configuration

!
mfusion mysql-server
 data-path /data
 max-conn 100
 start
!
security log-server
 log-input 100 accept msg mboxfw
 log-input 110 accept tag unbound
 log-input 120 accept tag klish
 log-input 130 accept tag dhcp
 start
!

Verify Status:

LOGGER-PRI# show security logging
Logging service:    running
Log-server:            running
Log-output:            NOT running

GUI Configuration

Navigate to Device Settings → Log Collector or (if managed by mfusion) ORCHESTRATOR → Device Settings → Security → Log Collector.

Click [Add Rule] to define what logs the collector accepts.

Log Collector Rules Configuration

Log Collector Rule Fields:

Field Description Example
Rule No. Sequential rule ID (evaluated top-down) 100, 110, 120
Rule Action Accept to store matching logs, Reject to discard Accept
Filter Criteria Match condition type: Host, Message, Facility, Priority, Tag, or All Tag
Syslog Tag Tag value to match when using Tag criterion mboxfw, unbound, dhcp

Verification

Test Command Expected Outcome
Debug syslogs tcpdump interface eth0 port 514 detail See if any syslog packets are sent to collector IP
Logs arriving Collector GUI → Live tab New log entries visible; auto-refresh every 5 seconds
Rules configured Collector CLI → show security logging Log-server: running

Managing Logs (Log Collector GUI)

When configured as a collector, the device provides a web-based interface to view, search, archive, and alert on logs.

Navigate to LOG COLLECTOR → Logs on the appliance GUI.

Live View

The Live tab displays incoming logs in real time, refreshed every 5 seconds by default.

Live Logs Tab

Feature Function
Pause Stop refresh for investigation
Filter/Search Display only matching logs (search by content, host, severity)
Message Details Hover or click a log line to view full message contents

Search & Export

The Search tab allows querying historical logs stored in the SQL database.

Search Tab

Feature Function
Search Criteria Filter by date range, host, message content, severity
Export to CSV Export search results to a downloadable file for offline analysis
Retention Searchable logs depend on the Keep raw logs locally setting (next section)

Archive

The Archive tab manages long-term log storage. Raw logs are compressed into CSV files and can be kept locally or backed up to external SFTP servers.

Archive Tab

Archive Settings:

Setting Description Recommendation
Archive log data Export raw logs to compressed CSV files (daily or hourly). Reduces storage by ~20x. Daily (unless log volume > 1GB/day, then hourly)
Keep raw logs locally How long to retain uncompressed logs in SQL database for live searching. 1 day (HSG); 7-30 days (mlog with large disk)
Keep archived files locally How long to retain compressed archives on the appliance. Per compliance requirements (min. 90 days)
Backup to SFTP Server Automatically copy archives to external FTP/SFTP server nightly. Recommended for compliance & disaster recovery

Tip

For typical networks (up to 2,000 users), daily archives are 50–100 MB. HSG's default 90GB disk can store 90+ days of archives. mlog appliances with additional HDD storage can retain 1+ years of logs.

Alarm Rules & Analysis Engine

The Alarms tab configures pattern-matching rules to detect and alert on suspicious log patterns.

Alarm Rules Configuration

Create a Rule:

Click New Rule to define an alarm condition.

Logical Operators:

Alarm Operators

Operator Behavior
and ALL criteria must match to trigger alarm
or ANY criteria match to trigger alarm

Filter Criteria:

Alarm Criteria

Match by: - Time: Trigger alarm during specific hours - Host: Match logs from specific source devices - Message/Content: Match logs containing specific text patterns

Actions:

Alarm Actions

Action Function
Email Notification Send alarm to specified email addresses
Alert Display Show in Alarms tab for operator review

Engine Control:

Engine Status

Enable/disable the analyzer engine. The engine runs every 1 minute to evaluate all rules against incoming logs.

Warning

Enabling many rules with large numbers of logs can impact system performance. Start with a few critical rules and monitor CPU usage.


Best Practices

Storage Sizing

Plan disk space based on log volume and retention requirements:

Scenario Log Volume Daily Archive 90-Day Storage
Small network (< 100 users) < 100 MB/day 5 MB compressed 500 MB
Medium network (100–1000 users) 100–500 MB/day 25–50 MB compressed 2.5–5 GB
Large network (1000–5000 users) 500 MB–2 GB/day 50–200 MB compressed 5–20 GB
Enterprise (> 5000 users) > 2 GB/day > 200 MB compressed Dedicated mlog (multi-TB)

Compliance & Retention

  • Minimum retention: Most countries require 90 days of firewall/URL access logs for internet-facing traffic
  • PCI DSS: Retain logs for at least 1 year; keep at least 3 months online
  • HIPAA: Retain audit logs for 6+ years for covered entities
  • Strategy: Keep 30 days of raw logs locally (fast search), 90+ days of archives (compliance), and optional SFTP backup (disaster recovery)

Syslog Export Best Practices

  • Start with "all": When first configuring log export, use ip logging ... all to capture everything, then tune filter rules after analyzing the output
  • Avoid duplicates: Ensure firewall rules don't overlap, causing the same log to match multiple export rules
  • Named rules: Use remarks to document each export rule's purpose
  • Test connectivity: Before relying on a collector, verify UDP/514 is open

High-Availability Logging

  • Redundant collectors: Configure multiple export destinations (requires separate ip logging rules)
  • SFTP backup: Archive logs to external NAS/storage for disaster recovery
  • Log rotation: Smaller, hourly archives (vs. daily) reduce single-file size and improve retrieval speed

Troubleshooting

Symptom Likely Cause Solution
Collector not receiving logs Firewall rule missing; UDP/514 blocked; export rules not configured Verify firewall-input 101 permit ... udp dport 514 on collector. Check tcpdump interface eth0 port 514 detail
Logs appearing but not filtering Filter criteria doesn't match log format Test filter rules with all first, then examine log content (Live tab) to refine matching criteria.
Disk space full on collector Archive retention too long or archival disabled Reduce Keep raw logs locally to 1 day. Enable archival with hourly rotation. Reduce Keep archived files locally to match compliance min.
Performance degradation Analyzer engine running complex rules; high log volume Disable unnecessary alarm rules. Move to hourly archival. Increase worker processes on SQL server.
Logs exported but local logs still needed Log export rules override local storage (design limitation) Do NOT configure log export for HSG if local logs are required. Use the Log Collector feature (Part 2) to store logs on-device instead.
"Show logging system" returns nothing Device has no firewall-access rules with logging Create a firewall-access rule with permit-log or deny-log action. Rule must match traffic to generate logs.