Network and Security Manager Administration Guide
Using the Log Viewer
746
Figure 104: Sample Packet Data
The Log Viewer displays log entries generated by a managed device when traffic matches
a firewall or VPN rule, or when an event occurs that matches a predefined set of
conditions. The main display of the Log Viewer displays summarized information about
security events and alarms, while the detail panes provide more detailed information
about a specific log entry.
This section provides details on the following Log Viewer functionality:
"Using Log Views" on page 747—The Log Viewer includes several predefined views for
critical severity attacks, configuration log entries, scans, and other important activity.
This section describes how to use filters to create your own unique, customized log
entry view, then save the custom view (with all its filters) for future use.
"Searching Log Entries" on page 754—For networks that generate large numbers of log
entries, it can be difficult to locate the exact log entries that detail the events you want
to investigate. This section describes how to use the log timeline to find logs generated
Copyright © 2010, Juniper Networks, Inc.
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?
Questions and answers