Solved

how should I configure my syslog.conf to receive messages from my watchguard x55e?

Posted on 2010-09-07
6
442 Views
Last Modified: 2012-05-10
I have a watchguard x55e and have enabled the syslog logging option. I need to configure the syslog to receive the messages and wonder how? I need to collect them for analysis by webspy.
0
Comment
Question by:serreze
  • 3
  • 3
6 Comments
 
LVL 32

Expert Comment

by:dpk_wal
ID: 33623773
Please read the article below to configure Edge:
http://watchguard.custhelp.com/app/answers/detail/a_id/1507

If you need help with configuration of syslog.conf please provide some details of the OS and the distribution.

If you wish you can use kiwi syslog daemon server which runs on any windows PC [http://www.kiwisyslog.com/kiwi-syslog-server-overview/].

Please advice if you need more help.

Thank you.
0
 

Author Comment

by:serreze
ID: 33628894
the watchguard part is already done, I need to configure syslog.
0
 
LVL 32

Accepted Solution

by:
dpk_wal earned 500 total points
ID: 33635041
0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 

Author Comment

by:serreze
ID: 33647858
thanks,
I was able to get the logging configured using syslog.conf and by also adding syslog parameters "-r" to receive from the remote device.
0
 

Author Closing Comment

by:serreze
ID: 33647868
it wasn't the answer, it was a way to get to it myself.
0
 
LVL 32

Expert Comment

by:dpk_wal
ID: 33659091
Thank you for the update.
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question