Sure. In fact, this is the recommended way to do remote syslog over insecure networks, because remote syslog data is unencrypted.
Just remember that you need an additional host-to-net tunnel, because the remote syslog data is generated on the firewall and will therefore not be routed through an already existing net-to-net tunnel.
Sure. In fact, this is the recommended way to do remote syslog over insecure networks, because remote syslog data is unencrypted.
Just remember that you need an additional host-to-net tunnel, because the remote syslog data is generated on the firewall and will therefore not be routed through an already existing net-to-net tunnel.