Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Extreme XSR Security Router


The Extreme XSR Security Router DSM for JSA accepts events by using syslog.

JSA records all relevant events. Before you configure an Extreme XSR Security Router in JSA, you must configure your device to forward syslog events.

For more information about your Extreme XSR Security Router, see your vendor documentation.

To configure the device to send syslog events to JSA:

  1. Using Telnet or SSH, log in to the XSR Security Router command-line interface.
  2. Type the following commands to access config mode:
    1. enable

    2. config

  3. Type the following command:

    logging <IP address> low

    Where: <IP address> is the IP address of your JSA.

  4. Exit from config mode.


  5. Save the configuration:

    copy running-config startup-config

    You are now ready to configure the log sources in JSA.

Syslog Log Source Parameters for Extreme XSR Security Router

If JSA does not automatically detect the log source, add a Extreme XSR Security Router log source on the JSA Console by using the syslog protocol.

When using the syslog protocol, there are specific parameters that you must use.

The following table describes the parameters that require specific values to collect syslog events from Extreme XSR Security Router:

Table 1: Syslog Log Source Parameters for the Extreme XSR Security Router DSM



Log Source type

Extreme XSR Security Routers

Protocol Configuration


Log Source Identifier

Type the IP address or host name for the log source as an identifier for events from your Extreme XSR Security Routers devices.