The CC Syslog service collects log messages from Barracuda NG Firewalls that are managed by the Barracuda NG Control Center and streams those log messages to an external log host or sends them to the HA partner. Syslog streaming consists of three major steps:
Log reception via port 5144 and/or 5143:
SSL-encrypted connections on port 5143 are used for log reception of managed boxes that do not use management tunnels. Using SSL allows for both encryption and authentication.
Managed NG Firewalls using a remote management tunnel connect to the syslog engine on port 5144. These connections are unencrypted and unauthenticated, so the default firewall rules restrict access managed boxes and access via VPN tunnel.
Log Delivery to Local Disk
Log Delivery via Private Uplink (HA Sync)
Using override IP addresses is mandatory in this scenario:
Log Delivery by Relaying
The Barracuda NG Firewall supports active querying and passive receiving via SSL-encrypted connection or passive receiving without encryption.
Active SSL querying
If read access is not possible (for example, because log host is down), transferring log messages is not possible. This method of transferring is not recommended for use in an HA Barracuda NG Control Center cluster.
SSL passive receiving
Used for an HA Barracuda NG Control Center cluster because the external log host does not need to know which partner is currently active for syslog streaming to work.
You can also do standard syslog streaming without an SSL connection if needed.