Network and Security Manager Administration Guide
724
Enable the device to send log entries with the desired severity settings to NSM.
Enable logging in the security policy installed on the device. For details on configuring
traffic logging in your security policy rules, see "Configuring Logging and Alerts" on
page 447.
Traffic log entries appear in the Log Viewer under the Traffic category. For details on
traffic subcategories, see "Traffic Log Entries" on page 927.
Policy Statistics
The device forwards statistics on the policy distribution of the traffic that entered the
device. Policy distribution statistics do not generate log entries; the statistics are used
by the Realtime Monitor module. For details on how policy distribution is displayed in
Realtime Monitor, see "Viewing Traffic Distribution by Security Policy" on page 642.
Attack Statistics
The device forwards statistics for attacks detected in the traffic that entered the device.
Attack statistics do not generate log entries; the statistics are used by the Realtime
Monitor module. For details on how attack statistics are displayed in the Realtime Monitor,
see "Viewing Attack Statistics" on page 651.
Ethernet Statistics
The device forwards statistics for Ethernet activity on the device. Ethernet statistics do
not generate log entries; the statistics are used by the Realtime Monitor module. For
details on how Ethernet statistics are displayed in Realtime Monitor, see "Viewing Ethernet
Statistics" on page 649.
Flow Statistics
The device forwards statistics for flows that entered the device. Flow statistics do not
generate log entries; the statistics are used by the Realtime Monitor . For details on how
flow statistics are displayed in the Realtime Monitor, see "Viewing Flow Statistics" on
page 650.
Protocol Distribution
The device forwards information on the protocol distribution of the traffic that entered
the device. Protocol distribution information does not generate log entries; the information
is used by the Realtime Monitor module. For details on how protocol distribution is
displayed in the Realtime Monitor, see "Viewing Traffic Distribution by Protocol" on
page 644.
The device reports statistics generated by the following services:
AH (Authentication Header)
ESP (Encapsulating Security Payload)
GRE (Generic Routing Encapsulation)
ICMP (Internet Control Message Protocol)
OSPF (Open Shortest Path First)
Copyright © 2010, Juniper Networks, Inc.