99
4.8 Web-Based Management - WBM
2. Under [General Options] enter the following parameters:
• Host Name
– Host name respectively IP address of the Syslog server to which the log data is to be sent.
• Protocol
– Transmission protocol to the server. TLS is recommended for secure transmission; for this
purpose, a trust store must be defined for verification. This can be done via 4.8.5 (1)
Certificate Authentication on page 89.
You can specify the corresponding Trust Store at [Trust Store].
• Port
– Port over which the communication with the Syslog server is to take place. Ensure that the
port is enabled in the firewall settings for outgoing requests. 4.8.5 (2) Firewall on page 94
3. Specify the following parameters at Filter Options:
• Facilities
– Here you specify the system type of the log data.
• Severity Level
– Determine here the severity level from which the log data is sent to the Syslog
server. Level 1: >= Internal (debug): All messages are sent.
Level 2: >= Information (info): Messages >= level 2 are
sent. Level 3: >= Warning (warning): Messages >= level 3
are sent. Level 4: >= Error (err): Messages >= level 4 are
sent.
Level 5: >= Critical Error (crit): Messages >= level 5 are
sent. Level 6: >= Fatal Error (alert): Messages >= level 6
are sent. Level 7: Emergency (emerg) Only emergency
messages are sent.
4. Click at [OK].
The dialog is closed and the Syslog server is listed in the table.
You can remove entries with and edit them with .
4
Deployment