Figure 117: Top Fw/Vpn Rules Report; Example: Using Ex Switch Reports To Track Configuration Changes - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Example: Using EX Switch Reports to Track Configuration Changes

Copyright © 2010, Juniper Networks, Inc.

Figure 117: Top FW/VPN Rules Report

By identifying the new rules that you implemented in the network, you can track how
effective the new rules are. If you find that a specific rule that is permitting too much
traffic, you may want to redefine it to be more strict. If you find that a specific rule is not
generating any log events, you may want to check it again to verify that you configured
it correctly; perhaps you configured an IP address incorrectly.
Regular review of the "Top FW/VPN Rules" report can help you to update and optimize
the rulebases implemented in your security policies.
In this example, you are a switch administrator responsible for configuring all the managed
switches in your network. You routinely update your switch configurations after hours.
To track those switches that have undergone the most configuration changes , you
generate a "Top Configuration Changes" report each night.
During the week, you can generate a similar report to track switches that have undergone
the most configuration changes committed during the past seven days. Figure 118 on
page 802 shows the Top Configuration Changes report.
Chapter 19: Reporting
801

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents