Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 1007

Table of Contents

Advertisement

specifying a time period............................................770
timeline............................................................................755
using the Find utility...................................................758
viewing.............................................................................732
log entry severity
accepted destinations...............................................734
log events................................................................................730
log files
archive location............................................................785
archiving..........................................................................784
estimating required disk space..............................785
managing disk space.................................................783
setting storage limits..................................................784
log ID, defined........................................................................836
Log Investigator
about..................................................................................26
analyzing log entries...................................................775
configuring axes.............................................................771
configuring options.....................................................770
excluding data...............................................................778
filters.................................................................................773
filters, example..............................................................774
log entry analysis, types of.......................................776
setting data point count............................................772
setting data types.........................................................771
UI overview.....................................................................769
using.................................................................................768
log severity
alert....................................................................................731
critical.......................................................................731, 732
debug.................................................................................731
debugging.......................................................................734
emergency.......................................................................731
error...........................................................................731, 732
information.....................................................................732
informational..................................................................731
levels..................................................................................731
notice.................................................................................731
notification.....................................................................732
warning....................................................................731, 732
log sub-categories...............................................................758
log types
self.....................................................................................733
Log Viewer
about...................................................................................25
column settings............................................................762
creating an exempt rule ...........................................486
editing security policy rules.....................................766
filtering...................................................................750, 758
Copyright © 2010, Juniper Networks, Inc.
find utility........................................................................758
flagging log events.......................................................757
generating a Quick Report........................................815
hiding and moving columns.....................................762
integration with reports.............................................814
linking to a device........................................................766
log categories................................................................758
log entry event details................................................753
log ID.................................................................................758
log sub-categories.......................................................758
predefined views..........................................................747
saving a view.................................................................750
saving custom views..................................................750
unknown values............................................................753
using.................................................................................746
using ranges for filtering...........................................760
log views
custom.............................................................................749
for EX Series devices...................................................747
Predefined......................................................................749
SSL/UAC predefined..................................................748
log, defined.............................................................................835
log2action
common filters.............................................................790
exporting to CSV................................................793, 794
exporting to script........................................................797
exporting to SMTP (e-mail)....................................795
exporting to SNMP......................................................794
exporting to syslog......................................................796
exporting to XML..........................................................793
format-specific filters................................................793
logging
configuring in firewall rules.......................................451
self log entries...............................................................735
Logs by User-set Flag report..................................804, 816
M
M Series devices
activating with dynamic IP address......................136
activating with static IP address............................134
adding multiple with discovery rules....................166
configuring......................................................................195
configuring dual Routing Engines..........................234
importing with dynamic IP address.......................124
importing with static IP address..............................116
supported routers...........................................................18
main display area....................................................................25
managed devices.....................................................................13
management connection, modifying............................193
Index
957

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents