Monitoring IDP Cluster Members
Using the Realtime Monitor
Monitoring the Management System
Copyright © 2010, Juniper Networks, Inc.
Click any IDP cluster to view details of each member in the cluster.
Table 77 on page 687 describes all of the information that is available from the IDP Cluster
Member Monitor.
Table 77: IDP Cluster Member Monitor
Item
Description
Name
Name of the device.
Status
State of the device (INIT, OK, or FAIL).
Domain
Domain in NSM in which the IDP cluster member is managed.
The following example describes a typical use case for monitoring your security devices,
VPNs, and NSRP clusters in NSM.
In this example, you are a network administrator responsible for monitoring the day-to-day
operation of all the security devices managed in your network. You are using NSM to
manage your network, and Realtime Monitor to monitor the up/down connection status
of all your security devices.
One day, you notice that the Connection Status on a mission-critical security device
indicates that the security device is DOWN. You wait several minutes to see whether the
connection status resolves itself because intermittent network problems might cause a
security device to temporarily indicate as DOWN. The Device Monitor still indicates that
the security device is DOWN.
You next try to ping the security device. If you are successful in reaching the device, you
can send a get status command to check the status of the security device.
If you cannot ping the security device, you need to investigate further. You scan the Log
Viewer for the log entry indicating that the security device has disconnected. You can
filter the log entries in the Log Viewer to display only the log entries generated for the
security device during the time just before it went down. Viewing these log entries will
also provide you with context for events leading to the security device disconnection.
This will help you to determine the cause of the problem.
You notice several very suspicious log entries that indicate that this security device may
have been the target of an attack. You flag the log entries using the predefined flag types
in the Log Viewer, and assign them to your security experts for further investigation.
Use the Server Manager to access, configure, and monitor the NSM management system.
The management system includes a GUI Server and Device Server. Refer to the Network
Chapter 17: Realtime Monitoring
687
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?
Questions and answers