Decrypting encrypted log on linux-based nfs server, Sendeventlog command, Table 13 sendeventlog command – Raritan Computer DOMINION DSX-0N-E User Manual

Page 128

Advertising
background image

110

D

OMINION

SX

U

SER

G

UIDE

Portlog Settings :

Enable : false

File Prefix: domSX-NFS

File Size : 65535

UpdateFrequency : 20

TimestampFrequency : 20

Input Log Enable : false

Input Log Directory: input

Output Log Directory: output

Encrypted : false

Decrypting Encrypted Log on Linux-based NFS Server

To decrypt nfs encryption on Linux platform, follow the instructions stated below:
1.

Retrieve the current nfs encryption key:

admin > Config > Log > nfsgetkey type rc4

(cut and paste the response of this command into a file, such as: dsx-encrypt.key)

2.

Retrieve decryption application and place it on the Linux machine, or compile its source.

3.

Save the encryption key file (e.g. dsx-encrypt.key) in the same directory where the
decryption application is stored.

4.

Copy the encrypted portlog file to the same directory.

5.

Decrypt the file using the command:
./decrypt -f <portlogfile> -e <keyfilename> -o <outputfile>

The decrypted file should be saved in <outputfile>.

Sendeventlog Command

The sendeventlog command sends the local logfile to a remote FTP server.
The syntax of the sendeventlog command is:
sendeventlog [ip ipaddress] [login login] [password password]
[path pathname] [file filename]

The sendeventlog command options are described in Table 13.

Table 13 Sendeventlog Command

C

OMMAND

O

PTION

D

ESCRIPTION

ip ipaddress

FTP server IP address

login login

FTP Server login name

password password

FTP Server password

path pathname

FTP server path. For example, /ftphome

file filename

Filename on FTP server to save log. For example, sxlogfile


Sendeventlog Command Example

admin > Config > Log > sendeventlog 72.236.162.187 login acy
password pasraritansword path sxlogfile file log 32

Advertising