Report Manager; Log Investigator; Realtime Monitor - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Report Manager

Log Investigator

Realtime Monitor

Table 6: Monitoring Status of NSM Managed Devices
NSM Managed Devices
Device Monitor
VPN Monitor
NSRP Monitor
IDP Cluster Monitor
Copyright © 2010, Juniper Networks, Inc.
View summarized information about security events and alarms
View information about a specific log entry
Show, hide, or move columns to customize the Log Viewer
Filter log entries by column headings
Create and save custom views that display your filters/column settings
Set flags on Log Viewer entries to indicate a specific priority or action
For more details on using the Log Viewer, see the Network and Security Manager
Administration Guide.
The Report Manager contains summary, graphs, and charts that detail specific security
events that occur on your network. NSM generates reports to visually represent the
information contained in your log entries. You can use reports to quickly summarize
security threats to your network, analyze traffic behavior, and determine the efficiency
of NSM. To share reports or to use report information in other application, you can print
or export report data.
The Log Investigator contains tools for analyzing your log entries in depth. Use the Log
Investigator to:
Manipulate and change constraints on log information
Correlate log entries visually and rapidly
Filter log entries while maintaining the broader picture
Realtime Monitor provides a graphical view of the current status of all devices managed
by NSM. Table 6 on page 15 describes the monitoring status of all NSM managed devices.
Monitoring Status
Tracks the connection state and configuration state of your security devices
and IDP sensors. You can also view device details to see CPU utilization and
memory usage for each device, or check device statistics.
Tracks the status of all VPN tunnels.
Tracks the status of security devices in clusters.
Tracks the status of IDP clusters.
You can customize Realtime Monitor to display only the information you want to see, as
well as update information at specified time periods. You can also set alarm criteria for
Chapter 1: NSM User Interface and NSM Key Management Features
15

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 and is the answer not in the manual?

Table of Contents