Sure. In fact, this is the recommended way to do remote syslog over insecure networks, because remote syslog data is unencrypted.
Just remember that you need an additional host-to-net tunnel, because the remote syslog data is generated on the firewall and will therefore not be routed through an already existing net-to-net tunnel.