We got it working, so I thought I'd share the trick

Ended up the network guys had syslog/tls pointing at the IP address instead
of the hostname that is present in the cert. There is no way to disable
cert validation on Ciscos, so the Cisco was dropping the session due to the
name mismatch. Also it appears (on Cisco) you have to configure CRL for the
CA used to sign the graylog TLS cert. That sounds weird to me - but that's
what they did to make it work

logging enable
logging timestamp
logging buffer-size 8196
logging monitor debugging
logging buffered debugging
logging trap debugging
logging history debugging
logging asdm informational
logging queue 0
logging device-id hostname
logging host outside fqdn 6/portNUM secure
logging permit-hostdown
crypto ca trustpoint CA-who-signed-graylogCert
 enrollment terminal
 crl configure
  whatever goes here for your CA
crypto ca certificate chain CA-who-signed-graylogCert
 certificate ca xxxxxxx

This will then enable the Cisco to create a syslog/TLS session to the
graylog server, and then you'll have to add some extractors to actually
glean the information you want - the Cisco's are bad at that too.

But all working now :-)



-- 
Cheers

Jason Haar
Information Security Manager, Trimble Navigation Ltd.
Phone: +1 408 481 8171
PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1

-- 
You received this message because you are subscribed to the Google Groups 
"Graylog Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to graylog2+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/graylog2/CAFChrgLjk0P6szsiJ9XdB6H3d%2B%2B1Rmi7hDvDu2pVRWNbJ%2Bmiag%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to