Extreme XSR Security Router
The Extreme XSR Security Router DSM for JSA accepts events by using syslog.
JSA records all relevant events. Before you configure an Extreme XSR Security Router in JSA, you must configure your device to forward syslog events.
To configure the device to send syslog events to JSA:
- Using Telnet or SSH, log in to the XSR Security Router command-line interface.
- Type the following commands to access config mode:
enable
config
- Type the following command:
logging <IP address> low
Where: <IP address> is the IP address of your JSA.
- Exit from config mode.
exit
- Save the configuration:
copy running-config startup-config
- You are now ready to configure the log sources in JSA.
Select Extreme XSR Security Routers from the Log Source Type list.
For more information about your Extreme XSR Security Router, see your vendor documentation.