Security considerations

As with all network communication protocols, give careful consideration to the security requirements that might be appropriate to protect this remote message logging function in your environment. The following considerations are some to be examined:

Obviously, the security considerations for deploying remote syslogd logging depend on your local environment and your local security policies. For more information about the z/OS configuration for IPSec, see Overview of using IP security. For more information about configuring IPSec on the remote hosts, consult the documentation for that platform.