How can we help?
-
zWAN
-
-
-
-
- Firewall & Layer 7 Application Filtering
- VPN Site-to-Site Tunnel Setup & Connectivity (z40 to Cloud vGR)
- Intrusion Prevention System (IPS) / Intrusion Detection System (IDS) Testing
- DNS Filtering
- DDoS Protection & Logging
- MAC Address Filtering & Geo-fencing
- Application Control & Protocol Blocking
- Authentication & Access Control (zID)
-
- WAN Link Failover & Load Balancing (ACI Mode)
- Dynamic Path Selection & Application-Aware Routing
- SaaS & Internet Breakout Validation
- QoS for Microsoft Teams (Datacenter vGR + Branch z40)
- Tunnel Failover (z40 ↔ vGR) — WAN00 (wired) primary, WAN03 (4G) & WAN04 (5G) backups
- IP Routing & Static Route Steering (z40 Branch)
- VLAN & Layer-2 Bridging
-
-
-
-
-
-
- Articles coming soon
-
-
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- IPsec Tunnel not Establishing
- SSL-VPN Tunnel not Establishing
- Mobile Network Issues
- Management Tunnel does not Establish
- DNS not Resolving from Local Network Appliance
- DNS Resolution Issues in Tunnel Configuration
- DHCP Server not Leasing IP to LAN PC
- Debugging EC Events - Unknown Status Issue
- Trusted-MAC Geofencing Issues
- DNS Issues from DC LAN PC
- Troubleshooting LAN Connectivity to Internet via WAN, Remote Branch LAN, or Local Branch LAN
- NetBalancer gateways displaying Faulty/Inactive
- Packet Drop Issues
-
-
zTC
-
-
-
-
-
- Citrix HDX + USB Headset (Call-Center Baseline)
- VMware Horizon + Smart Card / CAC Login
- Microsoft AVD/RDP + Teams Optimized Video
- Multi-Monitor & 4K Performance
- USB Device Management - Block Storage
- Printing to Local USB & Network Printers
- Barcode Scanner (HID) with Line-of-Business App
- Kiosk / Assigned-Access Auto-Launch
- Wi-Fi Roaming & Link Change Mid-Session
- Power Management and Session State
- OS/Firmware Update & Rollback
-
-
StorTrends
-
zAccess
-
zGuardian
You are here:
Print
Event Logging & Syslog Integration (Live)
0 out Of 5 Stars
| 5 Stars | 0% | |
| 4 Stars | 0% | |
| 3 Stars | 0% | |
| 2 Stars | 0% | |
| 1 Stars | 0% |
Objective
Demonstrate that the z40 Gateway Router and Director:
- Generate live event logs for security and system activities.
- Display those logs in Director in near real-time.
- Forward syslog messages to an external syslog server (via RSYSLOG) using TCP or UDP.
- Validate that events are received on the external server.
Prerequisites
- z40 onboarded to the Director tenant, tunnels up to the cloud vGR.
- LAN client connected on LAN00.
- Admin access to Director.
- External syslog server reachable (IP/hostname, port, protocol).
- Ability to generate benign test events (DNS block/allow, Geo-fence trigger, WAN link toggle).
Test 1 — Live Event Logs in Director
Setup
- In Director, go to Edge Controllers → [z40] → System → Logs.
- Confirm access to:
- DNS ALERT (blocked/allowed DNS lookups)
- SYSLOG → GEO-FENCE (Geo-fence policy events)
- SYSLOG → All Logs (aggregate stream)
Steps
- From LAN client, browse to a domain that is blocked by DNS filtering.
- Add an allow-override for the same domain and retry.
- Trigger a Geo-fence event (e.g., using test GPS location).
Validation
- DNS ALERT shows the blocked attempt, then the allowed attempt.
- SYSLOG → GEO-FENCE shows a new entry when the condition is triggered.
- All Logs reflects both events in the same window.
Evidence
- DNS ALERT entries with block/allow states.
- GEO-FENCE entries for the test trigger.
- All Logs showing both events.
Test 2 — Time Window & Auto-Refresh Controls
Setup
- On any Logs page, set time range to Last 15 minutes.
- Enable auto-refresh interval if available.
Steps
- Trigger DNS block/allow again while the Logs page is open.
Validation
- Entry appears within the current live window.
- Auto-refresh updates the page without reload.
Test 3 — Device Analytics Correlation
Setup
- In Director, go to Edge Controllers → [z40] → Analytics → Statistics → Logs and Events.
Steps
- Trigger DNS block/allow or Geo-fence alert while viewing this page.
Validation
- The same event shows in Logs and Events with matching timestamp.
- Confirms alignment between System → Logs and Analytics → Logs and Events.
Test 4 — Configure Remote Syslog Forwarding
Setup
- Navigate to Edge Controllers → [z40] → System → Monitoring → RSYSLOG.
- Click ADD REMOTE SERVER.
Steps
- Enter the following in Remote Server Configuration:
- Remote Server IP: <syslog_server_IP>
- Port: <port> (default 514 or as required; example: 5000)
- Protocol: select TCP or UDP
- Status: set to Enabled
- Save configuration.
- Verify the entry appears in the RSYSLOG list with the configured IP, port, protocol, and Status = Enabled.
Validation
- The syslog server receives log messages from the z40.
- Director RSYSLOG page shows the remote server entry active.
Evidence
- RSYSLOG table lists remote server with correct IP/Port/Protocol/Status.
- Syslog server shows corresponding entries arriving in real time.
Negative / Edge Tests
- Invalid server: Configure wrong IP or port; RSYSLOG entry shows Enabled, but server receives nothing.
- Disable forwarding: Toggle Status to Disabled, generate an event, confirm no new messages arrive on syslog server.
- Protocol mismatch: Configure server for UDP but client sends TCP (or vice-versa) → no events received.
Acceptance Criteria
- Live DNS and Geo-fence events appear immediately in Director logs.
- Events correlate between System → Logs and Analytics → Logs and Events.
- Remote syslog forwarding can be configured under System → Monitoring → RSYSLOG.
- Syslog server receives forwarded events with correct IP, port, and protocol.
- Disabling forwarding stops events at the remote server without impacting local Director logs.
Notes & Tips
- Use deterministic events (DNS block/allow, Geo-fence) so you know exactly when a log should be created.
- Short windows (Last 15 minutes) make it easy to confirm new entries.
- If integrating with ELK/Kibana, confirm logs appear in the dashboard with correct device identifiers.
- For troubleshooting, confirm network connectivity from z40 to syslog server (ping/telnet to port).
Was this article helpful?
0 out Of 5 Stars
| 5 Stars | 0% | |
| 4 Stars | 0% | |
| 3 Stars | 0% | |
| 2 Stars | 0% | |
| 1 Stars | 0% |
5
Table of Contents