User's Manual
conditionexpression
domainname
enable
match{ipaddrexpression|macexpression|userexpression}
positionposition
set{blacklist|rolerole}
For example:
esiparserruleforti_virus
condition“log_id=[0-9]{10}[]”
match“src=(.*)[]”
setblacklist
enable
Showing ESI syslog parser rule information:
showesiparserrules
Deleting a syslog parser rule:
noesiparserrulerule-name
Editing an existing syslog parser rule
esiparserrulerule-name
conditionexpression
domainname
enable
match{ipaddrexpression|macexpression|userexpression}
no
positionposition
set{blacklist|rolerole}
Testing a parser rule
esiparserrulerule-name
test{filefilename|msgmessage}
Monitoring Syslog Parser Statistics
The following sections describe how to monitor syslog parser statistics using the WebUI and CLI.
In the WebUI
You can monitor syslog parser statistics in the External Servers monitoring page, accessed by selecting
Monitoring>Switch> ExternalServicesInterface>SyslogParserStatistics.
The SyslogParserStatistics view displays statistics such as the number of matches and number of users per
rule, as well as the number of respective actions fired by the syslog parser.
The SyslogParserStatistics view also displays the last refresh time stamp and includes a RefreshNow button, to
allow the statistics information to be refreshed manually. There is no automatic refresh on this page.
In the CLI
showesiparserstats
Sample Route-mode ESI Topology
This section introduces the configuration for a sample route-mode topology using the controller and Fortinet
Anti-Virus gateways. In route mode, the trusted and untrusted interfaces between the controller and the
Fortinet gateways are on different subnets. The following figure shows an example route-mode topology.
Dell Networking W-Series ArubaOS 6.4.x | User Guide External Services Interface | 1004