Security Connector Web Console

While you configure the network interfaces in the security connector, you can also access the Web Console to configure these interfaces. The Web Console is a web-based user interface where you configure settings for the VM and perform administrative operations. Regardless if you have one or two interfaces set up for Security Connector, the Web Console is on the en1 interface.

On the Web Console, you can:

  • Generate a diagnostic report for debugging purposes. The diagnostic report contains logs and system files. When you encounter an issue that requires additional support, you can provide this report to ‚ÄčAkamai‚Äč Support.

  • Configure rsyslog: You can configure the VM to send logs to your organization's security information and event management product.

If you enabled and set up the proxy, the Web Console is automatically secured with the TLS certificate that you generated or uploaded from your organization as part of the proxy setup. If you haven‚Äôt set up the proxy, you can generate the ‚ÄčAkamai‚Äč certificate or if your company already has a public key infrastructure (PKI), you can create a certificate signing request (CSR) and upload the signed certificate to ‚ÄčSIA‚Äč. For instructions on creating this certificate, see Create an ‚ÄčAkamai‚Äč certificate and Create a non-‚ÄčAkamai‚Äč certificate.

ūüďė

The common name for this certificate is <SC ID>.sc.akaetp.net, where <SC_ID> is the identification number that’s associated with Security Connector. This ID is shown on the Security Connector page (Threat Protection > Clients & Connectors > Security Connectors) in Enterprise Center.

Web Console

Log in to the Web Console

Before you begin:

  • Make sure you‚Äôve generated an ‚ÄčAkamai‚Äč certificate, or if your organization has a public key infrastructure (PKI), make sure you upload the certificate that‚Äôs signed by your organization‚Äôs certificate authority (CA). If you've set up ‚ÄčSIA‚Äč Proxy, this is the same certificate that‚Äôs used for the proxy. For instructions on creating this certificate, see Create an ‚ÄčSIA‚Äč certificate and Create a non-‚ÄčSIA‚Äč certificate. This certificate must be distributed to user laptops. For more information on distributing the certificate, see Distribute the ‚ÄčSIA‚Äč Proxy certificate.

  • Make sure the common name of the Security Connector certificate matches the ID of the Security Connector. You can see certificate information from the browser you use with the Security Connector. The common name for this certificate is <SC_ID>.sc.akaetp.net, where <SC_ID> is the identification number that‚Äôs associated with Security Connector. This ID is shown on the Security Connector page (Threat Protection > Clients & Connectors > Security Connectors) in Enterprise Center.

Complete this procedure to log in to the Web Console.

To log in to the Web Console:

  1. In your browser, go to https://<SC_ID>.sc.akaetp.net:3000, where <SC_ID> is the identification number that’s associated with Security Connector. This ID is shown as the Connector ID on the Security Connector page (Threat Protection > Clients & Connectors > Security Connectors) in Enterprise Center.

  2. In the Web Console Login, enter the password for the security connector, and click Login.

Generate a diagnostic report

From the Web Console, you can generate a diagnostic report for debugging purposes. This operation creates a TAR file that you provide to ‚ÄčAkamai‚Äč Support.

To generate a diagnostic report:

  1. Log in to the Web Console.

  2. Click the gear icon and select Generate Diagnostic Report. A report is generated and saved to wherever your browser saves downloaded files.

Next steps

Contact ‚ÄčAkamai‚Äč Support and securely send the diagnostic report TAR file to your ‚ÄčAkamai‚Äč support representative.

Configure rsyslog

From the Web Console, you can configure the security connector to send logs to your organization's security information and event management product. By default, the security connector uses TLS encryption. As a result, a client certificate and client key signed by the CA of the rsyslog server is not required. If a certificate is not provided, the security connector accepts the encryption of the rsyslog server.

ūüďė

Ensure that the remote rsyslog server is configured to accept logs with the TCP.

To configure rsyslog:

  1. Log in to the Web Console.

  2. Click the edit icon to modify the VM settings in the Web Console.

  3. Click the Configure SIEM slider to change it from FALSE to TRUE.

  4. In the Server IP fields, enter the IP address and the port of the rsyslog server.

  5. To enable TLS and transport logs securely with a certificate:

    1. Click the Enable TLS slider to change it from FALSE to TRUE.

    2. In the CA certificate field, paste the contents of a certificate from your trusted CA.

    ūüďė

    If a certificate is not provided, the rsyslog server is trusted by default

  6. Click Save.

Modify the port of the Web Console

By default, the Web Console uses port 3000. However, you can modify it based on the ports allowed in your network. Make sure that the port you provide for this setting is not the one you use for the HTTP Forwarder explicit or transparent proxy.

To modify the port for the Web Console:

  1. In the Security Connector console menu, press 8 or or use the arrow keys to select Advanced and press Enter.

    ūüďė

    If HTTP Forwarder is disabled, Advanced may appear as menu item 7.

  2. Press 3 or use the arrow keys to select Configure WebUI port and press Enter.

  3. Press C to edit this setting.

  4. Type the new port number and press Enter. Make sure the port number you provide is not used for the transparent or explicit proxy configuration of HTTP Forwarder.

  5. Type yes and press Enter to confirm the change.