Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Extreme XSR Security Router


The Extreme XSR Security Router DSM for JSA accepts events by using syslog.

JSA records all relevant events. Before you configure an Extreme XSR Security Router in JSA, you must configure your device to forward syslog events.

To configure the device to send syslog events to JSA:

  1. Using Telnet or SSH, log in to the XSR Security Router command-line interface.
  2. Type the following commands to access config mode:
    1. enable

    2. config

  3. Type the following command:

    logging <IP address> low

    Where: <IP address> is the IP address of your JSA.

  4. Exit from config mode.


  5. Save the configuration:

    copy running-config startup-config

  6. You are now ready to configure the log sources in JSA.

    Select Extreme XSR Security Routers from the Log Source Type list.

    For more information about your Extreme XSR Security Router, see your vendor documentation.