Submit a ticketCall us

Solarwinds & Cisco Live! Barcelona
Join us from the 29th of January to the 2nd of February at Cisco Live 2018 in Barcelona, where we will continue to show how monitoring the network with SolarWinds will keep you ahead of the game. At our booth (WEP 1A), we will demonstrate how SolarWinds network solutions can help. As a bonus, we are also hosting a pre-event webinar - Blame the Network, Hybrid IT Edition with our SolarWinds Head Geek™, Patrick Hubbard on January 24th - GMT (UTC+0): 10:00 a.m. to 11:00 a.m. There's still time to RSVP.

Home > Success Center > Kiwi Syslog Server > Implement Kiwi Secure Tunnel for Untrusted Connections

Implement Kiwi Secure Tunnel for Untrusted Connections

Table of contents

Updated March 11th, 2016

Overview

This article provides steps on how to implement Kiwi Secure tunnel for untrusted connections. 

Environment

  • All version of Kiwi Syslog Server
  • All versions of Windows

Steps

  1. On the system housing the Primary collector (Kiwi Syslog Server) install the server version of the Kiwi Secure Tunnel software.
  2. Finish the configuration.
  3. Start the service.
  4. Enter the correct credentials for the client devices. 
  5. On the remote location, install the the client side of the software. If there has been another syslog server like KSS or ETS syslog, ensure the service is stopped and the port is free to use by KST.

 

Once the connection is established, and the service for UDP 514 is urnning, you should begin to see the remote LAN device syslogs being collected by the client and forwarded over the tunnel to the primary collector or the licensed version of KSS.

 

Last modified

Tags

Classifications

Public