Getting Data In

TCP-SSL on heavy forwarder (Checkpoint)

splunkreal
Motivator

Hello,

could you tell me how to properly have dedicated server certificate for specific tcp-ssl in inputs.conf (Checkpoint) and have another dedicated server certificate for the hf in server.conf, both using different sslpassword setting? Both are from same secondary rootCA.

Or should we keep single dedicated server certificate on heavyforwarder and only put dedicated Checkpoint certificate on appliance?

Thanks.

 

 

 

* If this helps, please upvote or accept solution if it solved *
Labels (3)
0 Karma

splunkreal
Motivator

yes that's the case "to differentiate between different inputs would be if you had clients authenticating with certs issued by different CAs to different inputs." thanks

* If this helps, please upvote or accept solution if it solved *
0 Karma

PickleRick
SplunkTrust
SplunkTrust

Technically, you could do a common list of CA's and bind them to all inputs (or just make one input with all those CAs) but I suppose you might not want that.  In that case you just bind one CA to one input and another CA to another input. You can then even limit access to just allowed SANs.

0 Karma

PickleRick
SplunkTrust
SplunkTrust

First important question - why do you even want to use TLS on this communication channel? If you have some externally enforced compliance rules you have to adhere to, that's another story but be aware that sending data from Checkpoint (I assume we're talking about LogExporter) over plain TCP can lead to performance problems. Not even using TLS over that connection. Are you sure you can handle that?

 

0 Karma

splunkreal
Motivator

Hello @PickleRick  yes there are compliance rules in our case. Thanks for your help.

* If this helps, please upvote or accept solution if it solved *
0 Karma

PickleRick
SplunkTrust
SplunkTrust

That's what I feared. You might run into performance issues. You've been warned.

Also - it's not a best idea to receive syslog (or pseudo-syslog like raw TCP-TLS stream) directly on the forwarder. If you have the option, I'd advise to set up a separate syslog collector (rsyslog/vanilla syslog-ng/SC4S - in no particular preference order) and either write to files and read from them with a UF or send via HEC to downstream.

But then again - you might not have the possibility here if you have compliance requirements.

splunkreal
Motivator

Hi @PickleRick  we have already tested it's ok with 100 gb/day.

Do you have sample configurations (inputs.conf / server.conf) to receive syslog over TLS?

 

I found this doc : https://support.checkpoint.com/results/sk/sk122323

 

 

Thanks for your help.

 

* If this helps, please upvote or accept solution if it solved *
0 Karma

PickleRick
SplunkTrust
SplunkTrust

As a general rule - the settings from server.conf are applied if they are not overwritten at inputs.conf/outputs.conf level. So if you specify a cert/CAcert or any other parameters at the particular input/output level, you will have those settings in force at that point.

So yes, you can have separate certs on each "endpoint" but honestly, I don't see much gain in this. The only use case I could think of to differentiate between different inputs would be if you had clients authenticating with certs issued by different CAs to different inputs.

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...