Extreme XSR Security Router
The Extreme XSR Security Router DSM for JSA accepts events by using syslog.
JSA records all relevant events. Before you configure an Extreme XSR Security Router in JSA, you must configure your device to forward syslog events.
For more information about your Extreme XSR Security Router, see your vendor documentation.
To configure the device to send syslog events to JSA:
- Using Telnet or SSH, log in to the XSR Security Router command-line interface.
- Type the following commands to access config mode:
- Type the following command:
logging <IP address> low
Where: <IP address> is the IP address of your JSA.
- Exit from config mode.
- Save the configuration:
copy running-config startup-config
You are now ready to configure the log sources in JSA.
Syslog Log Source Parameters for Extreme XSR Security Router
If JSA does not automatically detect the log source, add a Extreme XSR Security Router log source on the JSA Console by using the syslog protocol.
When using the syslog protocol, there are specific parameters that you must use.
The following table describes the parameters that require specific values to collect syslog events from Extreme XSR Security Router:
Table 1: Syslog Log Source Parameters for the Extreme XSR Security Router DSM
Log Source type
Extreme XSR Security Routers
Log Source Identifier
Type the IP address or host name for the log source as an identifier for events from your Extreme XSR Security Routers devices.