Configuration Log Entries; Information Log Entries - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide
738
security policy rule. When matched in a rule, protocol anomaly attack objects, signature
attack objects, and custom attack objects all generate Deep Inspection alarm log entries
that appear in the Log Viewer.
To receive Deep Inspection alarm log entries, you must:
Enable the device to generate Deep Inspection alarm log entries for NSM in Report
Settings > NSM.
Enable the device to send log entries with the desired severity settings to NSM in Report
Settings > General > NSM.
Enable Deep Inspection detection in the security policy installed on the device. For
details on configuring Deep Inspection logging in your security policy rules, see
"Configuring a DI Profile/Enable IDP for Firewall Rules" on page 457.
Deep Inspection alarm log entries appear in the Log Viewer and display the following
columns of information in the Log Viewer:
Source Address
Destination Address
Service
Action
Category (Predefined or Custom)
Subcategory (for details on Deep Inspection alarm subcategories, see "Deep Inspection
Alarm Log Entries" on page 864)
Severity

Configuration Log Entries

The device generates configuration log entries for events that change the configuration
on the device. Specifically, any command issued that the ScreenOS
statement captures and displays in ScreenOS generates a configuration log. For each
configuration change, the device generates a configuration log entry that contains
information about the change in the Log Viewer Detail column.
To receive configuration log entries, you must:
Enable the device to generate configuration log entries for NSM in Report Settings >
NSM.
Enable the device to send log entries with a notification severity setting to NSM in
Report Settings >General >NSM.
Configuration log entries appear in the Log Viewer under the category Configuration. For
details on configuration subcategories, see "Configuration Log Entries" on page 939.

Information Log Entries

The device generates information logs when it detects that an administrator has made
a change to the basic settings of the device, such as logging in or out, setting a new
command
get config
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents