Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Syslog Log Source Parameters for Raz-Lee iSecurity

If JSA does not automatically detect the log source, add a Raz-Lee iSecurity log source on the JSA Console by using the Syslog protocol.

When using the syslog protocol, there are specific parameters that you must use.

The following table describes the parameters that require specific values to collect Syslog events from Raz-Lee iSecurity:

Table 1: Syslog Log Source Parameters for the Raz-Lee iSecurity DSM

Parameter

Value

Log Source type

Raz-Lee iSecurity

Protocol Configuration

Syslog

Log Source Identifier

The IP address or host name of the log source that sends events from the Raz-Lee iSecurity device.

Enabled

By default, the check box is selected.

Credibility

The Credibility of the log source. The range is 0 - 10.

The credibility indicates the integrity of an event or offense as determined by the credibility rating from the source devices. Credibility increases if multiple sources report the same event. The default is 5.

Coalescing Events

By default, automatically discovered log sources inherit the value of the Coalescing Events list from the System Settings in JSA. When you create a log source or edit an existing configuration, you can override the default value by configuring this option for each log source.

Incoming Payload Encoding

Select Incoming Payload Encoder for parsing and storing the logs.

Store Event Payload

By default, automatically discovered log sources inherit the value of the Store Event Payload list from the System Settings in JSA. When you create a log source or edit an existing configuration, you can override the default value by configuring this option for each log source.