Table 75: Idp Cluster Member Monitor; Monitoring Idp Cluster Members; Using The Realtime Monitor; Monitoring The Management System - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Monitoring IDP Cluster Members

Using the Realtime Monitor

Monitoring the Management System

Copyright © 2010, Juniper Networks, Inc.
Click any IDP cluster to view details of each member in the cluster.
Table 75 on page 671 describes all of the information that is available from the IDP Cluster
Member Monitor.

Table 75: IDP Cluster Member Monitor

Item
Description
Name
Name of the device.
Status
State of the device (INIT, OK, or FAIL).
Domain
Domain in NSM in which the IDP cluster member is managed.
The following example describes a typical use case for monitoring your security devices,
VPNs, and NSRP clusters in NSM.
In this example, you are a network administrator responsible for monitoring the day-to-day
operation of all the security devices managed in your network. You are using NSM to
manage your network, and Realtime Monitor to monitor the up/down connection status
of all your security devices.
One day, you notice that the Connection Status on a mission-critical security device
indicates that the security device is DOWN. You wait several minutes to see whether the
connection status resolves itself because intermittent network problems might cause a
security device to temporarily indicate as DOWN. The Device Monitor still indicates that
the security device is DOWN.
You next try to ping the security device. If you are successful in reaching the device, you
can send a get status command to check the status of the security device.
If you cannot ping the security device, you need to investigate further. You scan the Log
Viewer for the log entry indicating that the security device has disconnected. You can
filter the log entries in the Log Viewer to display only the log entries generated for the
security device during the time just before it went down. Viewing these log entries will
also provide you with context for events leading to the security device disconnection.
This will help you to determine the cause of the problem.
You notice several very suspicious log entries that indicate that this security device may
have been the target of an attack. You flag the log entries using the predefined flag types
in the Log Viewer, and assign them to your security experts for further investigation.
Use the Server Manager to access, configure, and monitor the NSM management system.
The management system includes a GUI Server and Device Server. Refer to the Network
Chapter 16: Realtime Monitoring
671

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents