Self Log Entries; Traffic Log Entries - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
password for the device, issuing a key value for the device, or entering an MD5
authentication password to enter a device. For each administrative change, the device
generates an information log entry that contains information about the change in the
Log Viewer Detail column.
To receive information log entries, you must:
Enable the device to generate information log entries for NSM in Report Settings >
NSM.
Enable the device to send log entries with the info, warning, and error severity settings
to NSM in Report Settings > General > NSM.
Information log entries appear in the Log Viewer under the category Information. For
details on information subcategories, see "Information Log Entries" on page 941.

Self Log Entries

The device generates self log entries for any packet that terminates at the device. Self
log entries display information on traffic that was dropped by the device or that terminates
on the device.
To receive self log entries, you must:
Enable the device to generate self log entries for NSM in Report Settings > NSM.
Enable the device to send specific self log entries to NSM in Report Settings > General
> Firewall Options. For details, see "Forwarding Self Log Entries (Firewall Options)"
on page 735.
Self log entries appear in the Log Viewer under the category Self, which contains
information in the following Log Viewer columns:
Source
Destination
Services
Self log entries have the category "Self" and the subcategory "Self Log".
NOTE: In some cases, Junos devices return log messages in syslog format, which map
to "Self" for Category and Subcategory columns. Consequently, self log entries are not
necessarily the result of packets that terminate at the device or packets that were
dropped by a security device.

Traffic Log Entries

The device generates traffic log entries when your device detects network traffic that
matches the source, destination, and service specified in a security policy rule.
To receive traffic log entries, you must:
Enable the device to generate traffic log entries for NSM in Report Settings > NSM.
Chapter 19: Logging
739

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents