mirror of
https://git.eworm.de/cgit/routeros-scripts
synced 2025-08-02 01:04:55 +02:00
drop 'netwatch-syslog'
To filter in firewall you should use something like this: /ip/firewall/filter/add action=reject chain=output out-interface-list=WAN port=514 protocol=udp reject-with=icmp-admin-prohibited; /ip/firewall/filter/add action=reject chain=forward out-interface-list=WAN port=514 protocol=udp reject-with=icmp-admin-prohibited;
This commit is contained in:
parent
eccc187014
commit
bfe2cbf575
5 changed files with 6 additions and 52 deletions
|
@ -1,34 +1,5 @@
|
|||
Manage remote logging
|
||||
=====================
|
||||
This script has been dropped. Filtering in firewall is advised, which should
|
||||
look something like this:
|
||||
|
||||
[◀ Go back to main README](../README.md)
|
||||
|
||||
Description
|
||||
-----------
|
||||
|
||||
RouterOS supports sending log messages via network to a remote syslog server.
|
||||
If the server is not available no log messages (with potentially sensitive
|
||||
information) should be sent. This script disables remote logging by
|
||||
availability.
|
||||
|
||||
Requirements and installation
|
||||
-----------------------------
|
||||
|
||||
Let's assume there is a remote log action and associated logging rule:
|
||||
|
||||
/system/logging/action/set remote=10.0.0.1 [ find where name="remote" ];
|
||||
/system/logging/add action=remote topics=info;
|
||||
|
||||
Just install the script:
|
||||
|
||||
$ScriptInstallUpdate netwatch-syslog;
|
||||
|
||||
... and create a netwatch matching the IP address from logging action above:
|
||||
|
||||
/tool/netwatch/add down-script=netwatch-syslog host=10.0.0.1 up-script=netwatch-syslog;
|
||||
|
||||
All logging rules are disabled when host is down.
|
||||
|
||||
---
|
||||
[◀ Go back to main README](../README.md)
|
||||
[▲ Go back to top](#top)
|
||||
/ip/firewall/filter/add action=reject chain=output out-interface-list=WAN port=514 protocol=udp reject-with=icmp-admin-prohibited;
|
||||
/ip/firewall/filter/add action=reject chain=forward out-interface-list=WAN port=514 protocol=udp reject-with=icmp-admin-prohibited;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue