Barracuda Spam & Virus Firewall
You can integrate Barracuda Spam & Virus Firewall with JSA.
The Barracuda Spam & Virus Firewall DSM for JSA accepts both mail syslog events and web syslog events from Barracuda Spam & Virus Firewall appliances.
Mail syslog events contain the event and action that is taken when the firewall processes email. Web syslog events record information on user activity, and configuration changes that occur on your Barracuda Spam & Virus Firewall appliance.
Before You Begin
Syslog messages are sent to JSA from Barracuda Spam & Virus Firewall by using UDP port 514. You must verify that any firewalls between JSA and your Barracuda Spam & Virus Firewall appliance allow UDP traffic on port 514.
Configuring Syslog Event Forwarding
You can configure syslog forwarding for Barracuda Spam & Virus Firewall.
Log in to the Barracuda Spam & Virus Firewall web interface.
Click the Advanced tab.
From the Advanced menu, select Advanced Networking.
In the Mail Syslog field, type the IP address of your JSA console or Event Collector.
Click Add.
In the Web Interface Syslog field, type the IP address of your JSA console or Event Collector.
Click Add.
Syslog Log Source Parameters for Barracuda Spam Firewall
If JSA does not automatically detect the log source, add a Barracuda Spam Firewall log source on the JSA Console by using the syslog protocol.
When using the syslog protocol, there are specific parameters that you must use.
The following table describes the parameters that require specific values to collect syslog events from Barracuda Spam & Virus Firewall:
Parameter |
Value |
---|---|
Log Source Name |
Type a name for the log source. |
Log Source Description |
Type a description for the log source. |
Log Source type |
Barracuda Spam & Virus Firewall |
Protocol Configuration |
Syslog |
Protocol Configuration |
Type the IP address or host name for the log source. |