I know that this threat might be old, but as I was looking for the same thing, here are my conclusions, that I grave in another threat:
- The way to check the syslog information that NA is retreiving are 2:
1) With a Wireshark or tcpdump, for Win and Linux. 2) With the Troubleshooting tool: - Go to: Admin -> Troubleshooting: - Highlight the following in "Enabling logging for": *)Device/syslog *)External/syslog *)Device/Management *)Feature/changedetection And I add the following options as weel: *) External/syslog/syslogforward "At level" -> Trace (most messages)
This will fill a file set on : /opt/NA/server/log/syslog_wrapper.log
Normally, this file do not have much activities, but, remember that adding this "trace messages" will full it, and it is not something to be done permanently. it is just for test/review actions, and the settings in the trobleshooting tool must set to normal in a short period of time.