Figure 116: Logs By User-Set Flag Report; Example: Using Administrative Reports To Optimize Rulebases - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Example: Using Administrative Reports to Optimize Rulebases

800
You are a network manager interested in the progress of the investigation. To help track
the progress, you generate a "Logs by User-set Flag" report, as shown in Figure 116 on
page 800.
By setting the duration of the report to one week, you can determine the total number
of log entries flagged for investigation, total closed, and total assigned for further analysis.

Figure 116: Logs by User-Set Flag Report

In this example, you are a security administrator responsible for implementing new rules
to your firewall rulebase. After you have updated the new security policy on the managed
security devices in your network, you want to know the effect of the new rules on network
traffic.
You configure a "Top FW/VPN Rules" report to start at the same date and time that the
new rulebase settings were updated in the network. You also set the report data point
count to 100. In this way, you can get an indication for the top 100 rules that are generating
log events. Figure 117 on page 801 shows the Top FW/VPN Rules report.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents