Solved

how should I configure my syslog.conf to receive messages from my watchguard x55e?

Posted on 2010-09-07
6
438 Views
Last Modified: 2012-05-10
I have a watchguard x55e and have enabled the syslog logging option. I need to configure the syslog to receive the messages and wonder how? I need to collect them for analysis by webspy.
0
Comment
Question by:serreze
  • 3
  • 3
6 Comments
 
LVL 32

Expert Comment

by:dpk_wal
ID: 33623773
Please read the article below to configure Edge:
http://watchguard.custhelp.com/app/answers/detail/a_id/1507

If you need help with configuration of syslog.conf please provide some details of the OS and the distribution.

If you wish you can use kiwi syslog daemon server which runs on any windows PC [http://www.kiwisyslog.com/kiwi-syslog-server-overview/].

Please advice if you need more help.

Thank you.
0
 

Author Comment

by:serreze
ID: 33628894
the watchguard part is already done, I need to configure syslog.
0
 
LVL 32

Accepted Solution

by:
dpk_wal earned 500 total points
ID: 33635041
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 

Author Comment

by:serreze
ID: 33647858
thanks,
I was able to get the logging configured using syslog.conf and by also adding syslog parameters "-r" to receive from the remote device.
0
 

Author Closing Comment

by:serreze
ID: 33647868
it wasn't the answer, it was a way to get to it myself.
0
 
LVL 32

Expert Comment

by:dpk_wal
ID: 33659091
Thank you for the update.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now