Syslog Log Source Parameters for Raz-Lee i Security
If JSA does not automatically detect the log source, add a Raz-Lee i Security log source on the JSA Console by using the Syslog protocol.
When using the Syslog protocol, there are specific parameters that you must use.
The following table describes the parameters that require specific values to collect Syslog events from Raz-Lee i Security:
Table 1: Syslog Log Source Parameters for the Raz-Lee i Security DSM
Log Source Name
Type a name for your log source.
Log Source Description
Type a description for the log source.
Log Source Type
Log Source Identifier
Type the IP address or host name for the log source as an identifier for events from your IBM i system with Raz- Lee iSecurity.