Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 990

Table of Contents

Advertisement

Network and Security Manager Administration Guide
JUNOS devices
activating clusters.........................................................157
activating with dynamic IP address......................136
activating with static IP address............................134
adding clusters..............................................................155
adding multiple with discovery rules....................166
configuring......................................................................195
configuring dual Routing Engines..........................234
importing clusters........................................................156
importing with dynamic IP address.......................124
importing with static IP address..............................116
modeling clusters.........................................................157
JUNOS software, upgrading............................................264
L
L2TP
configuring in device-level VPNs..........................589
configuring in VPN Manager....................................547
large binary objects..............................................................273
lawful interception in GTP object..................................383
left axis, Log Investigator...................................................755
license key
displaying for device..................................................269
installing on device.....................................................269
obtaining.........................................................................269
line context for custom attack object...........................352
linking to a device from Log Viewer...............................750
list key parameters in templates....................................208
local attack object update...............................................288
local user groups...................................................................401
local users...............................................................................540
log actions
about..................................................................................771
csv.......................................................................................771
e-mail................................................................................772
SNMP.................................................................................771
syslog.................................................................................771
xml.....................................................................................772
log archives
file naming convention..............................................769
log categories
filtering in Log Viewer.................................................742
log columns
filtering in Log Viewer.................................................734
log criteria.................................................................................772
log destinations
e-mail server...................................................................719
Syslog...............................................................................726
WebTrends server........................................................727
940
log entries
actions...............................................................................771
archiving and retrieving with Unix
commands................................................................768
arriving...............................................................................741
configuration events...................................................722
criteria................................................................................771
customizing views.......................................................746
deep inspection alarm................................................721
enabling in firewall rules...........................................447
event alarm.....................................................................721
event generated............................................................714
exporting...........................................................................771
filtering by event and time........................................742
filtering with columns................................................748
filtering with multiple columns..............................764
filtering with ranges....................................................744
flagging.............................................................................741
identifying irrelevant attacks....................................751
identifying patterns....................................................249
investigating log data.................................................759
investigating patterns and trends..........................752
limiting number of.......................................................756
locating............................................................................738
locating types of information..................................755
Log Investigator filters................................................757
reducing............................................................................751
screen alarm..................................................................720
searching by ID..............................................................742
severity levels.................................................................715
SNMP................................................................................725
specifying a time period............................................754
timeline............................................................................739
using the Find utility....................................................742
viewing..............................................................................716
log entry severity
accepted destinations................................................718
log events.................................................................................714
log files
archive location............................................................769
archiving..........................................................................768
estimating required disk space..............................769
managing disk space..................................................767
setting storage limits..................................................768
log ID, defined........................................................................820
Log Investigator
about..................................................................................26
analyzing log entries...................................................759
configuring axes...........................................................755
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents