yes, this is true.. Probably lose a bit as currently I am logging all in
and out on a fairly busy network all back to 1 logger.

I will do some reading on this one as well, thanks


On 9/20/2005, "Will H. Backman" <[EMAIL PROTECTED]> wrote:

>> -----Original Message-----
>> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
>Of
>> James Mackinnon
>> Sent: Tuesday, September 20, 2005 9:43 AM
>> To: [email protected]
>> Subject: PFLogging to Syslog
>> 
>> Good day everyone
>> 
>> I have 20+ OpenBSD firewalls setup across Canada and I wanted to bring
>> the logs to a central server so I can make them web enabled so I can
>> view them in a web app
>> 
>> In the past, I used checkpoint, I like pf much better but the logging
>> system to checkpoint was nice
>> 
>> I have followed the PF: Logging section in the manaul, but I find not
>> everything that is going in pflog.txt is coming over to @syslogger
>> 
>> Is there a better technique I should be using for 20+ firewalls
>logging
>> to a central server and then what web app would you recommend so I
>could
>> look at the logs in some type of non-console view
>> 
>> Any suggestions and recommendations would be great as I would like to
>get
>> this right the first time:)
>> 
>> Thanks
>> 
>> James
>
>Syslog uses best-effort UDP, so all log entries are not guaranteed to
>get to the central server.  There are other syslog servers that offer
>better guarantees, and you may also want to use encryption and something
>to thwart traffic analysis.
>
>Take a look at syslog-ng, although I cannot tell you how it performs.  I
>have just heard people mention it in this situation.

Reply via email to