Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 797

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
To change column width, drag the left or right edge of the column header to the
desired width.
In this example, you want to view the following information in the Log Viewer:
The attacks that attempt to enter your network.
The source IP and port of the attacking computers.
The destination IP and port on the target computers.
The date and time of the attacks.
The devices that detected the attack.
The policies that matched the attack.
First, you configure the Log Viewer to display only the columns that contain the information
you are interested in viewing. Then you set can filters on those columns to narrow your
search.
To configure the column settings:
In the navigation tree, select the Log Viewer module.
1.
From the View menu, select Choose Columns. NSM displays the Column Settings
2.
dialog box, listing all columns.
Select the following columns:
3.
Time Received
Src Addr
Dst Addr
Src Port
Dst Port
Category
Subcategory
Device
Policy
Ensure all other columns are not selected, then click OK to apply your changes to
the Log Viewer.
In the main display area, select the Src Port column header, then drag the column
4.
to the right of the Src Addr column.
To configure the column filters:
In the main display area, right-click the Category column header and select Filter >
1.
Set Filter. The Category filter dialog box appears.
Chapter 18: Logging
747

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents