Solved

how should I configure my syslog.conf to receive messages from my watchguard x55e?

Posted on 2010-09-07
6
453 Views
Last Modified: 2012-05-10
I have a watchguard x55e and have enabled the syslog logging option. I need to configure the syslog to receive the messages and wonder how? I need to collect them for analysis by webspy.
0
Comment
Question by:serreze
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 32

Expert Comment

by:dpk_wal
ID: 33623773
Please read the article below to configure Edge:
http://watchguard.custhelp.com/app/answers/detail/a_id/1507

If you need help with configuration of syslog.conf please provide some details of the OS and the distribution.

If you wish you can use kiwi syslog daemon server which runs on any windows PC [http://www.kiwisyslog.com/kiwi-syslog-server-overview/].

Please advice if you need more help.

Thank you.
0
 

Author Comment

by:serreze
ID: 33628894
the watchguard part is already done, I need to configure syslog.
0
 
LVL 32

Accepted Solution

by:
dpk_wal earned 500 total points
ID: 33635041
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:serreze
ID: 33647858
thanks,
I was able to get the logging configured using syslog.conf and by also adding syslog parameters "-r" to receive from the remote device.
0
 

Author Closing Comment

by:serreze
ID: 33647868
it wasn't the answer, it was a way to get to it myself.
0
 
LVL 32

Expert Comment

by:dpk_wal
ID: 33659091
Thank you for the update.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question