Configuring Snmpv3 In Screenos Devices (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring ScreenOS Devices Guide
Related
Documentation

Configuring SNMPv3 in ScreenOS Devices (NSM Procedure)

170
Whether the security device includes traffic log entries, event log entries, or both
traffic and event log entries
The security facility, which classifies and sends messages to the Syslog host for
security-related actions; and the regular facility, which classifies and sends messages
for events unrelated to security
Which transport protocol (UDP or TCP) is used for sending syslog messages
Click OK.
4.
Use WebTrends reporting to configure a device to send syslog reports to a WebTrends
5.
Syslog host. WebTrends Firewall Suite enables you to customize syslog reports to
display the information you want in a graphical format.
To configure the security device to send syslog reports to a WebTrends Syslog host,
you first enable WebTrends reporting, and then specify the name of the WebTrends
host and the port on which the syslog messages are sent. If you are sending reports
through a VPN tunnel, click Use Trust Zone Interface.
As of ScreenOS 6.3, the event log, traffic log, and IDP log formats follow the WebTrends
Enhanced Format (WELF) log regulation. If backup for the logs is enabled, logs can
be sent to a maximum of four WebTrends servers. TCP or UDP transport protocol can
be used for communication. IP connections can be manually reset.
For more details on configuring these reporting options, see the Network and Security
Manager Administration Guide.
Configuring SNMPv3 in ScreenOS Devices (NSM Procedure) on page 170
General Report Settings for ScreenOS Devices Overview on page 168
The Simple Network Management Protocol (SNMP) agent for a Juniper Networks security
device provides network administrators with a way to view statistical data about the
network and the devices on it and to receive notification of system events of interest.
Juniper Networks security devices support SNMPv1, SNMPv2c, and SNMPv3. Security
devices are not shipped with a default configuration for SNMPv3. To configure your
security device for SNMPv3, you must first create a unique engine ID to identify an SNMP
entity and a user-based security model (USM) with the respective privilege and password.
By default, the SNMPv3 engine ID is the serial number of the device.
When you create a USM, you can specify the authentication type (MD5, SHA, or None).
The authentication type computes identical message digests for the same block of data.
The USM requires a password and uses Data Encryption Standard (DES) to encrypt and
decrypt the SNMPv3 packets.
To configure SNMPv3 features in ScreenOS devices:
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

Table of Contents