Cryptzone Support

 
If you wish to submit a support ticket please sign in to your customer portal or use the “submit a ticket” button at the top menu.
If you need to find documentation about our Sheriff Suite please login to the Hive- Click Here

 

Article

Server side information for trouble shooting

« Go Back

Information

 
Article Number000001053
Article

SiteInfo

The AppGate security server has a built-in command to gather information about the system for troubleshooting purposes.
1.    In the console navigate to Run Commands – siteinfo.
2.    Enter your root password and wait until the process is finished you will see a message informing you that the file has been created in appgate/tmp folder.
3.    Navigate to /tmp and pickup the file called AppGate_Status.

 User-added image

There is a second option; start a Terminal (in the AppGate Console, start Run commands-Terminal.
Become root (type "su" and enter the root password).
Type 'siteinfo' in the Terminal. The system will now collect information.
When this is done, it will inform you that the file has been created in appgate/tmp folder

Copy site info and other files to an USB stick attached to the appliance

If you cannot access the server with the AppGate console, you can copy the files to USB stick from a terminal/command line. Please read the following article how to mount a USB stick on the appliance:

Mount USB on appliance


Sever Logs

Log files resides under /appgate/log/ 
You can use file transfer in the console to download the desired log file.
 User-added image
The AppGate log files are binary files. To be able to read them elsewhere than on the AppGate server, you need to become root first and dump the files of interest to text. For example:
logcat -l /appgate/log/appgate.log >/tmp/logfile.txt

Use the file transfer tool in the AppGate console to move the files to your local machine.

 

To guarantee privacy

You can encrypt your files on the appgate command line, example:

openssl aes-256-cbc -in /tmp/<file-to-encrypt> -out /tmp/<encrypted-file-name>

You will be prompted to enter a password. Submit the password, and the cipher if other chosen than in the example above, in a separate reply or through alternative channels which you must request from support (e.g SMS).

Deccrypting the message can be achieved by:

openssl aes-256-cbc -d -in /tmp/<file-to-decrypt> -out /tmp/<file-name>

 

 

Related File 
Additional Files 

Feedback

 

Was this article helpful?


   

Feedback

Please tell us how we can make this article more useful.

Characters Remaining: 255