Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 1016

Table of Contents

Advertisement

Network and Security Manager Administration Guide
configuring.......................................................................197
importing clusters.........................................................157
importing with dynamic IP address.......................125
importing with static IP address..............................116
modeling clusters.........................................................157
supported routers...........................................................16
Job Manager
about...............................................................................9, 31
defined............................................................................844
job status logs, permission to purge................................82
jobs, permission to view.......................................................82
jumbo frames...........................................................................46
Juniper update........................................................................314
Junos clusters
activating.........................................................................158
adding...............................................................................156
configuring......................................................................235
importing..........................................................................157
modeling..........................................................................157
Junos devices
activating clusters........................................................158
activating with dynamic IP address......................136
activating with static IP address............................134
adding clusters..............................................................156
adding multiple with discovery rules....................168
configuring.......................................................................197
configuring dual Routing Engines.........................236
importing clusters.........................................................157
importing with dynamic IP address.......................125
importing with static IP address..............................116
modeling clusters.........................................................157
Junos OS NAT object............................................................417
Junos OS, upgrading...........................................................266
L
L2TP
configuring in device-level VPNs............................614
configuring in VPN Manager.....................................571
large binary objects..............................................................275
lawful interception in GTP object..................................386
left axis, Log Investigator....................................................781
legacy
NAT object......................................................................415
license key
displaying for device....................................................271
installing on device.......................................................271
obtaining..........................................................................271
linking to a device from Log Viewer...............................776
list key parameters in templates.....................................210
966
local attack object update...............................................290
local user groups..................................................................404
local users...............................................................................564
log actions
about................................................................................797
csv.....................................................................................798
e-mail...............................................................................798
SNMP................................................................................797
syslog................................................................................797
xml....................................................................................798
log archives
file naming convention..............................................795
log categories
filtering in Log Viewer.................................................768
log columns
filtering in Log Viewer.................................................760
log criteria................................................................................798
log destinations
e-mail server..................................................................745
Syslog...............................................................................752
WebTrends server........................................................753
log entries
actions..............................................................................797
archiving and retrieving with Unix
commands................................................................794
arriving..............................................................................767
configuration events...................................................748
criteria...............................................................................797
customizing views........................................................772
deep inspection alarm...............................................748
enabling in firewall rules...........................................457
event alarm.....................................................................747
event generated...........................................................740
exporting.........................................................................797
filtering by event and time.......................................768
filtering with columns.................................................774
filtering with multiple columns..............................790
filtering with ranges.....................................................770
flagging............................................................................767
identifying irrelevant attacks....................................777
identifying patterns......................................................251
investigating log data.................................................785
investigating patterns and trends..........................778
limiting number of.......................................................782
locating............................................................................764
locating types of information...................................781
Log Investigator filters................................................783
reducing............................................................................777
screen alarm..................................................................746
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents