The goal of this application is to securely transport syslog data from a network firewall to a remote logging server. Two main applications to the program: Client Application The purpose of this application is to: 1) Filter unwanted syslog data based on "m" code before sending over the Internet. 2) Encrypt data and send to the remote logging server. Server Application The purpose of this application is to: 1) Receive and decrypt syslog data from the client application. 2) Store the decrypted syslog data into a mySQL server database. Application Flow: Here is our initial thoughts on how this process will flow: 1) The client will install the client application will run in the systray of the Windows desktop or windows server. 2) When started, the user will be prompted with a username / password request. 3) The form data will be posted via HTTPS to our server. 4) Response from our webserver will include configuration data for the client to: a. Test for new client version. b. Obtain the host name of where to send the encrypted syslog data to. c. Obtain a list of what syslog "m" data to filter before sending to the server. d. Obtain any encryption information needed. 5) Client application will display: a. If it is properly connected. b. If it is sending encrypted data. 6) The server will receive the data packets from all clients. 7) If will decrypt the message and store in a mySQL database. Technical Deployment: The client must be able to run on Windows xp and newer. The server must run as a service on a Linux CentOS server. The server must include .conf file to allow assignment of IP and port to listen on for data.
## Deliverables
1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done.
2) Deliverables must be in ready-to-run condition, as follows? (depending on the nature? of the deliverables):
a)? For web sites or? other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in the Buyer's environment.
b) For all others including desktop software or software the buyer intends to distribute: A software? installation package that will install the software in ready-to-run condition on the platform(s) specified in this bid request.
3) All deliverables will be considered "work made for hire" under U.S. Copyright law. Buyer will receive exclusive and complete copyrights to all work purchased. (No GPL, GNU, 3rd party components, etc. unless all copyright ramifications are explained AND AGREED TO by the buyer on the site per the coder's Seller Legal Agreement).
## Platform
Windows Linux CentOS