ssh-broker-config — SSH Connection Broker configuration file format
The Connection Broker configuration file ssh-broker-config.xml
is a valid XML file.
The Connection Broker reads three configuration files (if all are available):
The ssh-broker-config-default.xml
file is
read first. It holds the factory default settings. It is not
recommended to edit the file, but you can use it to check the default
settings.
This file must be available and correctly formatted for the Connection Broker to start.
Next, the Connection Broker reads the global configuration file. The settings in the global configuration file override the default settings.
If the global configuration file is missing or malformed, the Connection Broker will start normally. A malformed global configuration file is ignored and no settings in it are used.
Last, the Connection Broker reads the user-specific configuration file if it is available.
If the global configuration file is valid, only the settings
under the key-stores
, profiles
, and
static-tunnels
elements are used from the user-specific
configuration. These are combined with the settings of the global
configuration file. If a connection profile with the same name has
been defined in both the global configuration file and user-specific
configuration file, the latter is used.
If the global configuration file is missing or malformed, all settings in the user-specific configuration file are used.
If the user-specific configuration file is missing, the Connection Broker will start using the previously read configuration files. However, if the user-specific configuration is malformed, the Connection Broker will not start.
On Unix, the default configuration file locations are
/etc/ssh2/ssh-tectia/auxdata/ssh-broker-ng/ssh-broker-config-default.xml
for the default configuration,
/etc/ssh2/ssh-broker-config.xml
for the global configuration, and
$HOME/.ssh2/ssh-broker-config.xml
for the user-specific configuration. The XML DTD can be found in the
/etc/ssh2/ssh-tectia/auxdata/ssh-broker-ng
directory.
On Windows, the default configuration file locations are
C:\Program Files\SSH Communications Security\SSH Tectia\SSH Tectia AUX\ssh-broker-ng\ssh-broker-config-default.xml
for the default configuration,
C:\Program Files\SSH Communications Security\SSH Tectia\SSH Tectia Broker\ssh-broker-config.xml
for the global configuration, and
%USERPROFILE%\Application Data\SSH\ssh-broker-config.xml
for
the user-specific configuration. The XML DTD can be found in the
C:\Program Files\SSH Communications Security\SSH Tectia\SSH Tectia AUX\ssh-broker-ng
directory.
This section describes the options available in the Connection Broker configuration file. See Appendix C for more information on the syntax of the configuration file.
The broker configuration file is a valid XML file and starts with the Document Type Declaration.
The root element in the configuration file is secsh-broker
.
It can include general
,
default-settings
,
profiles
,
static-tunnels
,
gui
,
filter-engine
, and
logging
elements.
An example of an empty configuration file is shown below:
<!DOCTYPE secsh-broker SYSTEM "ssh-broker-ng-config-1.dtd"> <secsh-broker version="1.0"> <general /> <default-settings /> <profiles /> <static-tunnels /> <gui /> <filter-engine /> <logging /> </secsh-broker>
The gui
and filter-engine
elements are
used with SSH Tectia Connector only.
general
ElementThe general
element contains settings such as the cryptographic
library and the key stores to be used.
This element selects the cryptographic library mode to be
used. Either the standard version (standard
) or the
FIPS 140-2 certified version (fips
) of the crypto
library can be used. The library name is given as a value of the
mode
attribute. By default, standard crypto libraries
are used.
FIPS mode will be used, if it is so specified either in global or in user configuration file (or both).
<crypto-lib mode="standard" />
This element defines public-key infrastructure (PKI) settings
used for validating remote server authentication certificates. The
element can have three attributes: end-point-identity-check
,
default-domain
, http-proxy-url
, and
socks-server-url
.
The end-point-identity-check
attribute specifies
whether the client will verify the server's hostname against the
Subject Name or Subject Alternative Name (DNS Address) in the
server's certificate. If set to no
, the fields in the
server host certificate are not verified and the certificate is
accepted based on validity period and CRL check only. Note that
this is a possible security risk, as anyone with a certificate
issued by the same trusted CA that issues the server host
certificates can perform a man-in-the-middle attack on the server if
a client has the end-point identity check disabled. The default
value is yes
.
The default-domain
attribute can be used when the
end-point identity check is enabled. It specifies the default domain
part of the remote system name and it is used if only the base part of
the system name is available. The default-domain
is
appended to the system name if it does not contain a dot
(.
).
If the default domain is not specified, the end-point
identity check fails, for example, when a user tries to connect to a
host "tower
" giving only the short hostname and the
certificate contains the full DNS address
"tower.fi.example.com
".
The http-proxy-url
attribute defines a HTTP proxy
and the socks-server-url
attribute defines a SOCKS
proxy for making LDAP or OCSP queries for certificate validity.
The address of the proxy is given as the value of the
attribute. The format of the address is
socks://username@socks_server:port/network/netmask,network/netmask ...
(with a SOCKS proxy) or
http://username@proxy_server:port/network/netmask,network/netmask ...
(with an HTTP proxy).
For example, by setting socks-server-url
to
"socks://mylogin@socks.ssh.com:1080/203.123.0.0/16,198.74.23.0/24"
,
the host socks.ssh.com
and port 1080
are used as your SOCKS server for connections outside of
networks 203.123.0.0
(16-bit domain) and
198.74.23.0
(8-bit domain). Those networks are
connected directly.
The cert-validation
element can contain multiple
ldap-server
and ocsp-responder
elements, a
dod-pki
element, and multiple ca-certificate
elements.
This element specifies an LDAP server address
and
port
used for fetching CRLs. Several LDAP servers can
be specified by using several ldap-server
elements.
CRLs are automatically retrieved from the CRL distribution point defined in the certificate to be checked if the point exists. Otherwise, the LDAP servers specified by these elements are used.
The default value for port
is 389
.
This element specifies an OCSP (Online Certificate Status
Protocol) responder service address in URL format
(url
). Several OCSP responders can be specified by
using several ocsp-responder
elements.
If the certificate has a valid Authority Info
Access
extension with an OCSP Responder URL, it will be used
instead of this setting. Note that for the OCSP validation to
succeed, both the end-entity certificate and the OCSP Responder
certificate must be issued by the same CA.
The validity-period
(in seconds) can be
optionally defined. During this time, new OCSP queries for the same
certificate are not made but the old result is used. The default
validity period is 0
(a new query is made every time).
This element defines whether the certificates are required to
be compliant with the DoD PKI (US Department of Defense Public-Key
Infrastructure). In practise, this means that the Digital
Signature bit must be set in the Key Usage of the certificate. The
enable
attribute can have a value of yes
or no
. The default is no
.
This element defines a CA used in server authentication.
It can have four attributes: name
, file
,
disable-crls
, and use-expired-crls
.
The name
attribute must contain the name of the CA.
The element must either contain the path to the X.509 CA
certificate file as a value of the file
attribute, or include the certificate as a base64-encoded
ASCII block.
CRL checking can be disabled by setting the
disable-crls
attribute to yes
. The default
is no
.
Expired CRLs can be used by setting a numeric value (in
seconds) for the use-expired-crls
attribute. The
default is 0
(do not use expired CRLs).
An example of a certificate validation configuration is shown below:
<cert-validation end-point-identity-check="yes" default-domain="example.com" http-proxy-url="http://proxy.example.com:800"> <ldap-server address="ldap://ldap.example.com:389" /> <ocsp-responder url="http://ocsp.example.com:8090" validity-period="0" /> <dod-pki enable="no" /> <ca-certificate name="ssh_ca1" file="ssh_ca1.crt" disable-crls="no" use-expired-crls="100" /> </cert-validation>
There can be one <key-stores>
instance
under the <general>
element. It can have any
amount of <key-store>
elements each of which
configures one key store provider.
The key-store
element has two attributes:
type
and init
. The type
attribute is the key store type. Currently supported types are
"software"
, "mscapi"
,
"entrust"
, and "pkcs11"
. The
init
attribute is the key-store-provider-specific
initialization info.
An example key store configuration which enables the software provider with one key directory is shown below:
<key-stores> <key-store type="software" init="directory(C:\UserKeys)" /> </key-stores>
This element enables strict host key checking. If it is enabled,
the Connection Broker never adds host keys to the user's
.ssh2/hostkeys
directory upon connection, and refuses to
connect to hosts whose key has changed. This provides maximum
protection against man-in-the-middle attacks. However, it can be
somewhat annoying if you frequently connect to new hosts.
The word yes
or no
is given as the
value of the enable
attribute. The default is
no
(the user is asked whether to accept a new or changed
host key).
Strict host key checking will be used, if it is so specified either in global or in user configuration file (or both).
<strict-host-key-checking enable="yes" />
This element defines whether the Connection Broker should prompt the user to accept the proposed host key even if it is already known.
The word yes
or no
is given as the
value of the enable
attribute. The default is
no
(known host keys are accepted without prompting).
Host keys are always asked, if it is so specified either in global or in user configuration file (or both).
<host-key-always-ask enable="yes" />
default-settings
ElementThe default-settings
element defines the default
connection-related settings. Profile-specific settings can override
these settings.
This element defines the ciphers that the client will propose to
the server. The ciphers
element can contain multiple
cipher
elements.
The ciphers are tried in the order they are specified.
This element selects a cipher name
that the client
requests for data encryption.
The supported ciphers are
3des-cbc
,
aes128-cbc
,
aes192-cbc
,
aes256-cbc
,
arcfour
,
blowfish-cbc
,
twofish-cbc
,
twofish128-cbc
,
twofish192-cbc
,
twofish256-cbc
,
crypticore128@ssh.com
,
seed-cbc@ssh.com
,
and
none
(no encryption).
In the FIPS mode, the supported ciphers are
3des-cbc
,
aes128-cbc
,
aes192-cbc
,
and
aes256-cbc
.
<ciphers> <cipher name="crypticore128@ssh.com" /> <cipher name="aes128-cbc" /> </ciphers>
This element defines the MACs that the client will propose to
the server. The macs
element can contain multiple
mac
elements.
This element selects a MAC name
that the client
requests for data integrity verification.
The supported MAC algorithms are
hmac-md5
,
hmac-md5-96
,
hmac-sha1
,
hmac-sha1-96
,
crypticore-mac@ssh.com
,
and
none
(no data integrity verification).
In the FIPS mode, only hmac-sha1
is supported.
<macs> <mac name="hmac-sha1" /> </macs>
This setting defines the number of transport channels used by the Secure Shell connection. Using more than one transport may increase the throughput over low bandwidth connections.
The number of transports is given as value of the
num-transports
attribute. Currently, a value of
1
to 8
transports is supported.
The default is 2
.
<transport-distribution num-transports="2" />
This element specifies the number of transferred
bytes
after which the key exchange is done again. The
value "0"
turns rekey requests off. The default is 0 (no
rekeys). This does not prevent the server from requesting rekeys,
however.
<rekey bytes="10000000" />
This element specifies the authentication methods that are
requested by the client. The authentication-methods
element can
contain multiple authentication-method
elements.
The authentication methods are tried in the order of the
authentication-method
elements. This means that the least
interactive methods should be placed first.
This element specifies an authentication method name
.
If you want to use non-interactive password authentication, you
can also predefine a response
(text string) or
a response-file
(path to a file containing the
response).
Note | |
---|---|
Use this option only with tunneling connections when the tunneled application takes care of authentication. In any case, specifying a password or other authentication secret in the configuration file will not provide full level of security. This option is not recommended for scripting. |
The allowed authentication method names are:
gssapi-with-mic
, publickey
,
keyboard-interactive
, password
, and
hostbased
.
SSH Tectia Client supports host-based authentication only on Unix platforms.
<authentication-methods> <authentication-method name="hostbased" /> <authentication-method name="gssapi-with-mic" /> <authentication-method name="publickey" /> <authentication-method name="keyboard-interactive" /> <authentication-method name="password" /> </authentication-methods>
This element specifies whether to use compression.
The name
of the compression algorithm and the
compression level
can be given as attributes. Currently
only zlib
is supported as the algorithm. The
level
can be an integer from 0
to
9
. By default, compression is not used.
<compression name="none" />
This element defines rules for HTTP or SOCKS proxy servers the
client will use for connections. It has a single attribute:
ruleset
.
The format of the attribute value is a sequence of rules
delimited by semicolons (;
). Each rule has a format
that resembles the URL format. In a rule, the connection type is
given first. The type can be direct
,
socks
, socks4
, socks5
, or
http-connect
(socks
is a synonym for
socks4
). This is followed by the server address and
port. If the port is not given, the default ports 1080 for SOCKS and
80 for HTTP are used.
After the address, zero or more conditions delimited by commas
(,
) are given.
direct:///[cond[,cond]...] socks://server/[cond[,cond]...] socks4://server/[cond[,cond]...] socks5://server/[cond[,cond]...] http-connect://server/[cond[,cond]...]
The IP address/port conditions have an address pattern and an optional port range:
ip_pattern[:port_range]
The ip_pattern
may have one of the following forms:
IP: a single IP address
FROM-TO: an IP address range from FROM to TO
IP/MASK: a sub-network with a network mask with MASK significant bits.
DNS name conditions consist of a hostname which may be a regular expression containing the characters "*" and "?" and a port range:
name_pattern[:port_range]
An example proxy
element is shown below. It causes
the server to access the callback address and the ssh.com
domain directly, access *.example
with HTTP CONNECT, and
all other destinations with SOCKS4.
<proxy ruleset="direct:///127.0.0.0/8,*.ssh.com; http-connect://http-proxy.ssh.com:8080/*.example; socks://fw.ssh.com:1080/" />
This element specifies how long idle time (after all connection
channels are closed) is allowed for a connection before
automatically closing the connection. The time
is given
in seconds.
The default setting is 5 seconds. Setting a longer time allows
the connection to the server to remain open even after a session (for
example, sshg3
) is closed. During this time, a new
session to the server can be initiated without re-authentication.
<idle-timeout time="5" />
This element defines whether the server banner message file (if it
exists) is visible to the user before login. The word
yes
or no
is given as the value of the
visible
attribute. The default is yes
.
<server-banners visible="no" />
This element contains forward
elements that
define whether X11 or agent forwarding (tunneling) are allowed at
the client side.
This element defines X11 or agent forwarding settings.
The type
attribute defines the forwarding
type (either x11
or agent
). The
state
attribute sets the forwarding
on
, off
, or
denied
. If the forwarding is set as denied
, the
user cannot enable it on the command-line.
An example forward configuration, which allows X11 forwarding and denies agent forwarding globally, is shown below:
<forwards> <forward type="x11" state="on" /> <forward type="agent" state="denied" /> </forwards>
For more information on using X11 and agent forwarding, see X11 Forwarding and Agent Forwarding (Unix).
profiles
ElementThe profiles
element defines the connection profiles for connecting
to different servers. It can contain multiple profile
elements. Each profile defines connection rules to one server.
The profile
element defines a connection
profile. It has seven attributes: id
,
name
, host
, port
,
connect-on-startup
, user
, and
gateway-profile
.
The profile id
must be a unique identifier that
does not change during the lifetime of the profile. The
id
value must contain the letters id
and
a number. For example, id1
and id303
are
valid identifiers.
An additional name
can be given to the profile.
This is a free-form text string.
The host
address and port
must
also be given. The address can be either an IP address or a domain name.
The default port is 22
.
If you want to make the connection specified by the profile
automatically at reboot, set the value of the
connect-on-startup
attribute to yes
. In
this case, give also the user
attribute (the username
the connection is made with). You also need to set up some form of
non-interactive authentication for the connection.
In the user
attribute, the value
'%USERNAME%
' can be used to set the username to the
current user. In the host
and user
attributes, the value '*
'
can be used to prompt the user for the hostname or the username.
The gateway-profile
attribute can be used to
create nested tunnels. The profile name through which the
connection is made is given as the value of the attribute. The
first tunnel is created using the gateway host profile and from
there the second tunnel is created to the host defined in
this profile.
This element gives the path to the remote server host
public key file as a value of the file
attribute.
Alternatively, the public key can be included as a base64-encoded ASCII block.
This element defines the ciphers used with this profile. See
the section called “The default-settings
Element”.
This element defines the MACs used with this profile. See
the section called “The default-settings
Element”.
This element defines the transport distribution for this
profile. See the section called “The default-settings
Element”.
This element defines the rekeying settings used with this
profile. See the section called “The default-settings
Element”.
This element defines the authentication methods used with this
profile. See the section called “The default-settings
Element”.
This element defines the compression settings used with this
profile. See the section called “The default-settings
Element”.
This element defines the proxy settings used with this
profile. See the section called “The default-settings
Element”.
If a gateway profile (gateway-profile
) has been
defined for this profile, the proxy setting is ignored and the
default proxy setting or the proxy setting of the gateway profile is
used.
This element defines the idle timeout settings used with this
profile. See the section called “The default-settings
Element”.
This element defines the server banner setting used with this
profile. See the section called “The default-settings
Element”.
This element defines the forwards allowed with this profile.
See the section called “The default-settings
Element”.
The tunnels
element defines the tunnels that are
opened when a connection with this profile is made. The element can
contain multiple local-tunnel
and remote-tunnel
elements.
This element defines a local tunnel (port forwarding). It
has five attributes: type
, listen-port
,
dst-host
, dst-port
, and allow-relay
.
The type
attribute defines the type of the
tunnel. This can be currently tcp
, ftp
,
or socks
.
The listen-port
attribute defines the local
port to be listened. The dst-host
and dst-port
attributes define the destination host. The value of
dst-host
can be either an IP address or a domain
name. The default is 127.0.0.1
(localhost).
The allow-relay
attribute defines whether
connections are allowed from outside the localhost. The default is
no
.
For more information on using tunneling, see Local Tunnels.
This element defines a remote tunnel (port forwarding). It
has four attributes: type
, listen-port
,
dst-host
, dst-port
, and allow-relay
.
The type
attribute defines the type of the
tunnel. This can be either tcp
or ftp
.
The listen-port
attribute defines the remote
port to be listened. The dst-host
and dst-port
attributes define the destination host. The value of
dst-host
can be either an IP address or a domain
name. The default is 127.0.0.1
(localhost).
The allow-relay
attribute defines whether
connections are allowed from outside the localhost. The default is
no
.
For more information on using tunneling, see Remote Tunnels.
An example connection profile is shown below:
<profile name="tower" id="id1" host="tower.example.com" port="22" connect-on-startup="no" user="doct"> <hostkey file="key_22_tower.pub"> </hostkey> <authentication-methods> <authentication-method name="publickey" /> <authentication-method name="password" /> </authentication-methods> <server-banners visible="yes" /> <forwards> <forward type="agent" state="on" /> <forward type="x11" state="on" /> </forwards> <tunnels> <local-tunnel type="tcp" listen-port="143" dst-host="imap.example.com" dst-port="143" allow-relay="no" /> <remote-tunnel type="tcp" listen-port="11000" dst-host="localhost" dst-port="99" /> </tunnels> </profile>
static-tunnels
ElementWith the static-tunnels
setting, you can create listeners for
local tunnels automatically when the Connection Broker starts up. The actual tunnel
is formed the first time a connection is made to the listener port. If
the connection to the server is not open at that time, it will be opened
automatically as well.
The static-tunnels
element can contain any number of
tunnel
elements.
The tunnel
element specifies a static tunnel.
It has six attributes: type
, listen-port
,
dst-host
, dst-port
,
allow-relay
, and profile
.
The type
attribute defines the type of the
tunnel. This can be either tcp
or ftp
.
The listen-port
attribute defines the local
port to be listened. The dst-host
and
dst-port
attributes define the destination host address and port.
The value of dst-host
can be either an IP address or a domain name.
The allow-relay
attribute defines whether
connections are allowed from outside the localhost. The
default is no
.
The profile
attribute specifies the connection profile id that is used for the tunnel.
<static-tunnels> <tunnel type="tcp" listen-port="9874" dst-host="st.example.com" dst-port="9111" allow-relay="no" profile="id1" /> </static-tunnels>
gui
Element (SSH Tectia Connector)The GUI element contains only one element (gui
), which
is used to adjust SSH Tectia Connector GUI settings. The gui
element has
four attributes, all of which must have yes
or
no
as the value. These settings have no effect if SSH Tectia Connector
has not been installed on the system.
The hide-tray-icon
attribute controls whether the SSH Tectia
tray icon is displayed in the system tray. The default is
no
(the tray icon is displayed).
The show-exit-button
attribute controls whether the
Exit button is displayed in the SSH Tectia Connector shortcut menu. The default is
yes
.
The show-admin
attribute defines whether the SSH Tectia Connector
Administration GUI is accessible to the users. The default is
yes
.
The enable-connector
attribute defines whether SSH Tectia Connector
is active and capturing connections. The default is yes
.
The show-security-notification
attribute defines
whether the SSH Tectia Connector security notification is shown upon establishing a
secure application tunnel. The default is yes
.
<gui hide-tray-icon="no" show-exit-button="yes" show-admin="yes" enable-connector="yes" show-security-notification="yes" />
filter-engine
Element (SSH Tectia Connector)The Filter Engine element defines the SSH Tectia Connector filter rules. These settings have no effect if SSH Tectia Connector has not been installed on the system.
The top level element is filter-engine
. It has one
attribute: ip-generate-start
. This attribute defines the
start address of the pseudo IP address space. Pseudo IPs are generated
by the Connection Broker when applications do the DNS query through the SSH Capture
DLL.
Under the filter-engine
element there can be any
amount of elements of the type network
, dns
, or
filter
. The order of the elements is important, because the
filter engine uses the elements in the order they were specified in the
configuration file.
The network
element specifies a "location"
where SSH Tectia Connector is running. Using the network
elements you can implement location awareness for SSH Tectia Connector. It
has four attributes: id
, address
,
domain
, and ip-generate-start
.
The id
attribute specifies a unique identifier
for a network
entry. It is used for referencing
purposes explained later. address
is the address of the
network. The address attribute can be missing or empty, in which
case it is not used. domain
is the domain name of the
computer. It can also be missing or empty, in which case it is not
used. The ip-generate-start
attribute defines the start
address of the pseudo IP space. If it is defined here, it overrides
the ip-generate-start
attribute of the
filter-engine
element.
The dns
element creates a DNS rule for the
filter engine. It has five attributes: id
,
network-id
, application
,
host
, ip-address
, and
pseudo-ip
.
The id
attribute specifies a unique identifier
for a dns
entry. The network-id
attribute
contains a reference to a network
element. This can be
left empty if the dns
entry does not bind to a specific
network. The application
attribute specifies the
application for which this DNS entry is used. This can be a regular
expression.
The host
attribute specifies a target host
name. It can also be a regular expression. The ip-address
attribute specifies the target host IP address. It can be a
regular expression. When both the hostname and the IP address are
defined, they both have to match for the rule to take effect. When the
ip-address
is left empty one of the following
things happen:
When the pseudo-ip
attribute is set to
yes
, a pseudo IP address is assigned for the
host.
When the pseudo-ip
attribute is set to
to no
, a normal DNS query is made for the
host
name.
The filter
element specifies an action for a
connection. It has three attributes: dns-id
,
ports
, action
, and fallback-to-plain
.
dns-id
is a reference to a dns
entry, ports
define the port range, and
action
specifies the action to be done when a
filter is used. The ports
attribute can be a
single port or a range. A range is specified with a dash
between two integers (like "21-25"
). The
action
can be DIRECT
,
BLOCK
, or a reference to a Broker profile ID
in the configuration file. If the action is a reference to
profile ID, then a connection is tunneled through a Secure
Shell server specified in the profile.
When applying the filter rule, if creating the tunnel fails
(or the connection to the Secure Shell server fails) the Connection Broker will
normally return a "host not reachable" error. However, if the
fallback-to-plain
attribute is set to yes
,
a direct (unsecured) connection is used instead.
An example filter engine configuration is shown below.
<filter-engine ip-generate-start="188.1.1.1"> <network id="office" address="10.1.48.0" domain=".*ssh\.com" ip-generate-start="" /> <dns id="telnet-app-dns" network-id="office" application=".*telnet.exe" host=".*" ip-address="" pseudo-ip="yes" /> <dns id="all-dns" network-id="office" application="" host=".*" ip-address="" pseudo-ip="yes" /> <dns id="www-proxy-dns" network-id="office" application="" host="www-cache.*" ip-address="10.1.0.11" pseudo-ip="no" /> <filter id="telnet-filter" dns-id="telnet-app-dns" ports="23" action="tower" fallback-to-plain="no" /> <filter id="block-ftp-filter" dns-id="all-dns" ports="21" action="BLOCK" fallback-to-plain="no" /> <filter id="www-proxy-filter" dns-id="www-proxy-dns" ports="8080" action="DIRECT" fallback-to-plain="no" /> <filter id="all-other-filter" dns-id="all-dns" ports="1-65535" action="firewall" fallback-to-plain="no" /> </filter-engine>
This configuration specifies the following:
All connections from a telnet application are tunneled through a profile named tower
.
All connections to a FTP port are blocked.
Connections to a WWW proxy host are passed through directly.
All other connections are tunneled through a profile named firewall.
All of the rules are only used in the "office"
network which is
specified by network address 10.1.48.0
. Pseudo IPs are generated
starting from 188.1.1.1
.
logging
ElementThe logging
element changes the logging settings that
define the log event severities and logging facilities. The element
contains one or more log-events
elements.
This element sets the severity and facility of different logging events. The events have reasonable default values, which are used if no explicit logging settings are made. This setting allows customizing the default values.
For the events, facility
and
severity
can be set as attributes. The events
itself should be listed inside the log-events
element.
The facility can be normal
, daemon
,
user
, auth
, local0
,
local1
, local2
, local3
,
local4
, local5
, local6
,
local7
, or discard
. Setting the
facility to discard
causes the server to ignore
the specifed log events.
On Windows, only the normal
and
discard
facilities are used.
The severity can be informational
,
notice
, warning
, error
,
critical
, security-success
, or
security-failure
.
Any events that are not specifically defined in the
configuration file will use the default values. The defaults
can be overridden for all remaining events by giving an empty
log-events
element after all other definitions
and setting a severity value for it.
For a complete list of log events, see Appendix E.