Log Viewer Detail Panes - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 101: Log Viewer Columns (continued)
Column
Default
Rule Domain ver
No
Rulebase
No
Src Intf
No
Src Port
No
Src Zone
No
Time Generated
No
User
No
After you import a device configuration, log entries from that device begin to appear in
the Log Viewer.
NOTE: The
is supported for new logs from devices running ScreenOS 6.3 and
Policy ID
later, and Junos firewall devices. The

Log Viewer Detail Panes

The Log Viewer contains additional panes that provide summary and detail information
for log entry events. To see detailed information about a log entry, select the entry and
view the detail panes at the bottom of the Log Viewer. The detail pane contains four tabs
of information about the selected log record:
Summary tab (default tab)—Details the event associated with the selected log entry.
Within the summary tab, you can view the event description (right side) and the variable
data (left side). Not all log entries contain variable data—only log entries generated
by an attack provide variable data.
All Fields tab—Provides a condensed view of data for the selected log entry (so you
do not need to scroll horizontally).
Whois tab—Enables you to perform a Whois lookup on an IP address to see what
organization has registered a particular address.
Quick Reports tab—Enables you to quickly generate a predefined report on a filter
criteria in the Log Viewer.
Meaning
The domain version containing the rule that generated this
log.
The policy rulebase of a specific domain version that
generated this log.
The name of the packet-centric inbound interface.
The TCP/UDP port number of the source device that
generated the packet that generated the log entry.
Source zone associated with a traffic log entry. Log entry data
for this column only appears after you update the security
device. The source zone is the zone that is attempting to send
the traffic through the security device.
The time the current log was generated.
The user associated with this log.
column remains empty for older logs.
Policy ID
Chapter 19: Logging
753

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents