User guide
Working with Log Files
User Guide 201
5 Save the new configuration to the remote office Firebox.
On the log host:
You must use the same log encryption key on the remote office Firebox as
is configured on the log host protected by the main office Firebox. To
modify the log encryption key on the log host, see “Setting log encryption
keys” on page 199.
You should see the IP address for the remote office Firebox in the list as
soon as it connects. However, it will not appear until the remote office
Firebox has been properly configured.