Table 63: Ha Statistics View - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
From the
1.
Device Manager
window appears.
Troubleshoot Device
Select the appropriate command from the list of
2.
window. The command appears in the
Shortcuts
Click on the
Execute Command
3.
field below. All commands that you execute appear in the
You can use the
Add to Shortcut
window to create a list of CLI command shortcuts.
Device
NOTE: Commands from NSM originate from the UI client to the security device. If you
intend to issue
commands from NSM, you must plan and implement security policy
get
rules in your network accordingly.
Viewing High Availability (HA) Statistics (if applicable)
If you have configured security devices to be highly available, you can view NSRP-related
statistics on the device by accessing the HA Statistics view. Table 63 on page 659 describes
all of the information that is available from the HA Statistics view:

Table 63: HA Statistics View

Item
VSD Group ID
Number of Units
State Change Counter
Init Counter
Master
Primary BackUp
BackUp
Ineligible
InOperable
Master Conflict
Primary Backup Conflict
Tx Heartbeat
, right-click on any device and select
button. The status of the command appears in the
or
Remove from Shortcut
Description
The group ID that is associated with the VSD (or RTO).
The number of units associated with the VSD (or RTO).
The number of times a security device changes operational states.
The transient state of a VSD (or RTO) group member while it was in
the process of joining the VSD (or RTO) group.
The number of master security devices.
The number of primary backup security devices.
The total number of backup security devices.
An administrator purposefully assigned a security device so that it
cannot participate in selecting a new master security device.
A VSD (or RTO) group security device has an internal problem.
The number of conflicts that occurred on the master security device.
The number of conflicts that occurred on the primary backup security
device.
The number of transmitted heartbeats on the security devices.
Chapter 16: Realtime Monitoring
Troubleshoot
Predefined Commands
in the
field.
Command
window.
History
buttons in the
Troubleshoot
. The
659

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents