Submit a ticketCall us

AnnouncementsChange Is Inevitable

Get valuable help when it comes to tracking and monitoring changes. SolarWinds® Server Configuration Monitor (SCM) is designed to help you: detect, track, and receive alerts when changes occur, correlate system performance against configuration changes, compare server and application configuration against custom baselines, and verify application and system changes.

Learn more.

Home > Success Center > Kiwi Syslog Server > Kiwi Sys - Knowledgebase Articles > Implement Kiwi Secure Tunnel for Untrusted Connections

Implement Kiwi Secure Tunnel for Untrusted Connections

Table of contents

Updated March 11th, 2016

Overview

This article provides steps on how to implement Kiwi Secure tunnel for untrusted connections. 

Environment

  • All version of Kiwi Syslog Server
  • All versions of Windows

Steps

  1. On the system housing the Primary collector (Kiwi Syslog Server) install the server version of the Kiwi Secure Tunnel software.
  2. Finish the configuration.
  3. Start the service.
  4. Enter the correct credentials for the client devices. 
  5. On the remote location, install the the client side of the software. If there has been another syslog server like KSS or ETS syslog, ensure the service is stopped and the port is free to use by KST.

 

Once the connection is established, and the service for UDP 514 is urnning, you should begin to see the remote LAN device syslogs being collected by the client and forwarded over the tunnel to the primary collector or the licensed version of KSS.

 

Last modified

Tags

Classifications

Public