Symantec 10521146 - Network Security 7120 Administration Manual page 261

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

Oracle or to MySQL. SuperUsers and Administrators can configure Symantec
Network Security to send copies of its operational log messages to the UNIX
syslog facility. To do so, you must configure syslog to receive the operational log
data, and enable Symantec Network Security to send data to a syslog server by
entering a non-zero value for the Echo Operational Log to Syslog parameter. The
value must correspond to syslog priority levels 1-4, inclusive.
Note: To export to syslog, syslog must be running in remote mode. This may not
necessarily be the default. See the Unix or Linux man pages for more details.
Note: SuperUsers and Administrators can export logs; StandardUsers and
RestrictedUsers cannot. See
about permissions.
Symantec Network Security can export event data to syslog. Data remains in the
proprietary format. Syslog is always considered remote, even if located on the
same host. This section includes the following syslog export parameters:
Setting Syslog Event Export
Setting Echo Operational Log to Syslog
Setting Remote Syslog Destination Host
Setting Remote Syslog Destination Port
Setting Syslog Maximum Message Size
Note: To export to syslog, syslog must be running in remote mode. This may not
be the default. See the Unix or Linux man pages for more details.
Setting Syslog Event Export
Syslog Event Export serves as the main on/off switch for sending event data to
syslog. If this value is
The default value is
false
Destinational Host for this parameter to function.
To configure this parameter
1
Click Configuration > Node > Network Security Parameters.
2
In Select Node, choose the node from the pull-down list, and click OK.
"User groups reference"
, then events are sent to syslog.
true
. Note that you must also configure the Remote Syslog
Managing log files
Exporting data
on page 319 for more
261

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents