Figure 36: Configuring a Syslog Receiver
5.
In the Name field, enter a name for the syslog receiver. This is the name that the syslog
receiver will be known by within NSM.
6.
In the IP field, Enter the IP address of the syslog receiver.
7.
In the Transport field, select the type of syslog receiver:
•
Select
UDP
for basic syslog implementations.
•
Select
TCP
for rsyslog or syslog-NG implementations.
53
Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring NSM from the Web Interface
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 10: ...Copyright 2010 Juniper Networks Inc x NSMXpress Series II User Guide...
Page 14: ...Copyright 2010 Juniper Networks Inc xiv NSMXpress Series II User Guide...
Page 22: ...Copyright 2010 Juniper Networks Inc 2 NSMXpress Series II User Guide...
Page 88: ...Copyright 2010 Juniper Networks Inc 68 NSMXpress Series II User Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 70 NSMXpress Series II User Guide...
Page 96: ...Copyright 2010 Juniper Networks Inc 76 NSMXpress Series II User Guide...
Page 99: ...PART 3 Index Index on page 81 79 Copyright 2010 Juniper Networks Inc...
Page 100: ...Copyright 2010 Juniper Networks Inc 80 NSMXpress Series II User Guide...
Page 104: ...Copyright 2010 Juniper Networks Inc 84 NSMXpress Series II User Guide...