Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 839

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Selecting Severity
In the Severity tab, select the severities for the criteria.
Selecting Actions
In the Actions tab, select the actions (SNMP, syslog, XML, CSV, Email, and Script) you
want the management system to take for logs that meet the criteria. You can enable
multiple actions.
When you enable the Email/SMTP and Script actions, you can also configure the following
additional settings:
Email Action—To direct the management system to e-mail qualified log records, specify
the From and To e-mail addresses:
From Email Address—The e-mail address that the server uses to send e-mail. Some
servers require a valid "from" e-mail address to relay mail.
To Email Addresses—The e-mail address that receives e-mail alarms. You can specify
multiple "to" e-mail addresses.
Script Action—To direct the management system to send qualified log records to a
script, you must configure the following:
Script Enable
Script To Run—Select the script you want to run from the Script To Run list. For a
script to appear in the list, the script must be located in the appropriate directory on
the NSM Device Server.
Scripts for the global domain must appear in the
/usr/netscreen/DevSvr/var/scripts/global/
Scripts for subdomains must appear in
/usr/netscreen/DevSvr/var/scripts/global/subDomainName/
is the name of the subdomain. The
manually.
The
/usr/netscreen/DevSvr/lib/scripts/
use or modify,
sample.sh
Action Upon Script Failure—Specify the error handling for the script:
Skip. Directs the system to skip any log for which the script had an error.
Retry. Directs the system to try the action again for the same log. When using
this filter, you must also specify:
directory.
subDomainName
directory contains two sample scripts you can
and
sample.pl
.
Chapter 19: Logging
where
subDomainName
directory must be created
789

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents