Chapter 3
Device Management
4.
[Optional] Define one or more match patterns or permitted peers. Permitted peers compare the server's host
name to the common name defined in the SSL certificate. For more information, refer to
"Adding a Permitted
Type commit and press Enter to save the changes, or type revert and press Enter to abort.
5.
Section 3.9.5.2
Viewing a List of Permitted Peers
To view a list of permitted peers, type:
show running-config admin logging secure-remote-syslog permitted-peer
If peers have been configured, a table or list similar to the following example appears:
ruggedcom# show running-config admin logging secure-remote-syslog permitted-peer
admin
logging
secure-remote-syslog permitted-peer *.example.com
!
!
!
If no permitted peers have been configured, add peers as needed. For more information, refer to
"Adding a Permitted
Section 3.9.5.3
Adding a Permitted Peer
To add a permitted peer for secure remote syslog, do the following:
1.
Make sure the CLI is in Configuration mode.
2.
Add the permitted peer by typing:
admin logging secure-remote-syslog permitted-peer pattern
Where:
• pattern is the pattern used to match the common name defined in the SSL certificate received from the
server
Type commit and press Enter to save the changes, or type revert and press Enter to abort.
3.
Section 3.9.5.4
Deleting a Permitted Peer
To delete a permitted peer for secure remote syslog, do the following:
1.
Make sure the CLI is in Configuration mode.
2.
Delete the firewall by typing:
no admin logging secure-remote-syslog permitted-peer pattern
Where:
66
Peer".
Peer".
RUGGEDCOM ROX II
CLI User Guide
Section 3.9.5.3,
Section 3.9.5.3,
Viewing a List of Permitted Peers