Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Syslog Log Source Parameters for Raz-Lee i Security

If JSA does not automatically detect the log source, add a Raz-Lee i Security log source on the JSA Console by using the Syslog protocol.

When using the Syslog protocol, there are specific parameters that you must use.

The following table describes the parameters that require specific values to collect Syslog events from Raz-Lee i Security:

Table 1: Syslog Log Source Parameters for the Raz-Lee i Security DSM



Log Source Name

Type a name for your log source.

Log Source Description

Type a description for the log source.

Log Source Type


Protocol Configuration


Log Source Identifier

Type the IP address or host name for the log source as an identifier for events from your IBM i system with Raz- Lee iSecurity.