3 Audit Logging Feature
The Audit Logging Feature of Oracle Advanced Services Gateway provides audit information for three different categories of system events. The three categories are:
- Outbound Network Connections: The Linux firewall service (iptables) triggers notifications for all outbound network traffic with the exception of traffic to Oracle managed hosts used for monitoring and management (for example, Oracle VPN end points, dts.oracle.com, support.oracle.com).
- Outbound Login Activity: The Linux auditing service (auditd) triggers notifications for all outbound login attempts initiated from Oracle Advanced Services Gateway. This is done by monitoring usage of the ssh and telnet system binaries. Oracle Advanced Services Gateway sends a message that ssh or telnet has been used, by which user, and when. The destination is not provided. auditd logs contain that information. auditd logs are not directly accessible by the customer on Oracle Advanced Services Gateway.
- Inbound Oracle Advanced Services Gateway User Login Activity: The Linux auditing service (auditd) triggers notifications each time any of the system logs used for tracking logins is updated. This includes failed logins and successful login attempts. It also triggers a notification each time a user logs in from a remote system. These activities are monitored using auditd and forwarded to the customer's central logging system.
All audit notifications are delivered using standard syslog protocol. A central logging system must be provided to accept and process these messages.
The format of most of these messages is based on auditd. They can be managed using various auditd and related utilities.
The audit logging feature is disabled by default, and must be explicitly enabled through the Oracle Advanced Services Gateway command line interface (CLI). The details of how to configure this feature are explained in the following section:
Initial Login.
-
Use
sshto connect to Oracle Advanced Services Gateway.Use the customer administrator account configured at installation time or any other user with the customer administrator role.
- At the first (CLI or CLISH) prompt, enter the password.
- At the next prompt enter
configure terminal. - At the next prompt enter
syslog.
You are now in the syslog-specific section of the Oracle Advanced Services Gateway CLI where you can configure forwarding.
Table 3-1 Available Commands
| Command | Description |
|---|---|
| help | To display a list of available commands. |
| ? | To display a brief explanation of how to enter commands in the CLI. |
| stat |
To display the current configuration. This produces a display similar to the following: |
| forward enable | To enable syslog forwarding. |
| forward disable | To disable syslog forwarding. |
| ip <ip address> |
To enter the IP address of the remote syslog server (the one receiving the forwarded messages). You must enter a valid IP address, not a host name. |
| port <port #> | To change the port used for forwarding syslog messages. |
| timezone <value> |
To set the time zone used in the forwarded syslog messages. Value must be -12 to +12 which is the offset from GMT. |
| mapping enable mapping disable | To convert the uid and guid contained in each message to the corresponding Unix user and group name. |