Event Alarm Log Entries; Traffic Alarm Log Entries; Deep Inspection Alarm Log Entries - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Subcategory (for details on Screen subcategories, see Appendix E. )
Severity

Event Alarm Log Entries

The device generates event alarms for any security event that has a predefined severity
level of emergency, critical, or alert. Event alarms generate log entries that appear in the
Alarm category.
To receive event alarm log entries, you must:
Enable the device to generate event alarm log entries for NSM in Report Settings >
NSM.
Enable the device to send log entries with emergency, alert, and critical severity settings
to NSM.
Event alarms appear in the Log Viewer under the Alarm category. For details on Attack
subcategories, see "Alarm Log Entries" on page 863.

Traffic Alarm Log Entries

The device generates traffic alarm log entries when your device detects network traffic
that exceeds the specified alarm threshold in a security policy rule. The traffic alarm log
entry, which displays in the Log Viewer, describes the security event that triggered the
alarm. Traffic alarms generate log entries that appear in the Alarm category.
To receive traffic alarm log entries, you must:
Enable the device to generate traffic alarm log entries for NSM in Report Settings >
NSM.
Enable the device to send log entries with the desired severity settings to NSM.
Enable counting and alarms in the security policy installed on the device. For details
on configuring traffic alarm logging in your security policy rules, see "Configuring
Counting and Alarms" on page 451.
Traffic alarms appear in the Log Viewer under the Alarm category. For details on alarm
subcategories, see "Alarm Log Entries" on page 863.
Alarm log entries contain information in the following Log Viewer columns:
To Zone
From Zone
Source IP
Destination IP
Threshold (displayed in the Misc. column of the Log Viewer)

Deep Inspection Alarm Log Entries

The device generates Deep Inspection alarm log entries when a device with Deep
Inspection (DI) detects network traffic that matches an attack object specified in a
Chapter 19: Logging
737

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents