Submit a ticketCall us

WebinarWebinar: A checklist for planning your Network Performance Monitor (NPM) upgrade

Are you ready for your next upgrade? To help you plan smoothly, join this webcast to learn more about, SolarWinds® Orion® Installer, SolarWinds Upgrade Advisor, Upgrades Guides, Training Videos, and other resources available. We’ll share key upgrade planning considerations, lessons learned from customers with practical advice from SolarWinds Product Experts. We’ll also give practical tips to identify the estimated time needed and resources, how to prepare the business and IT staff for changes, ways to plan for required system changes, and more.

Register now.

Home > Success Center > Kiwi Syslog Server > Kiwi Sys - Knowledgebase Articles > Implement Kiwi Secure Tunnel for Untrusted Connections

Implement Kiwi Secure Tunnel for Untrusted Connections

Table of contents

Updated March 11th, 2016

Overview

This article provides steps on how to implement Kiwi Secure tunnel for untrusted connections. 

Environment

  • All version of Kiwi Syslog Server
  • All versions of Windows

Steps

  1. On the system housing the Primary collector (Kiwi Syslog Server) install the server version of the Kiwi Secure Tunnel software.
  2. Finish the configuration.
  3. Start the service.
  4. Enter the correct credentials for the client devices. 
  5. On the remote location, install the the client side of the software. If there has been another syslog server like KSS or ETS syslog, ensure the service is stopped and the port is free to use by KST.

 

Once the connection is established, and the service for UDP 514 is urnning, you should begin to see the remote LAN device syslogs being collected by the client and forwarded over the tunnel to the primary collector or the licensed version of KSS.

 

Last modified

Tags

Classifications

Public