Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 1017

Table of Contents

Advertisement

searching by ID.............................................................768
severity levels.................................................................741
SNMP.................................................................................751
specifying a time period...........................................780
timeline............................................................................765
using the Find utility...................................................768
viewing.............................................................................742
log entry severity
accepted destinations...............................................744
log events................................................................................740
log files
archive location............................................................796
archiving..........................................................................794
estimating required disk space..............................795
managing disk space..................................................793
setting storage limits..................................................795
log ID, defined.......................................................................846
Log Investigator
about..................................................................................26
analyzing log entries...................................................785
configuring axes............................................................781
configuring options.....................................................780
excluding data..............................................................788
filters.................................................................................783
filters, example.............................................................784
log entry analysis, types of......................................786
setting data point count............................................782
setting data types.........................................................781
UI overview.....................................................................779
using..................................................................................778
log severity
alert....................................................................................741
critical.......................................................................741, 742
debug.................................................................................741
debugging.......................................................................744
emergency.......................................................................741
error...........................................................................741, 742
information.....................................................................742
informational..................................................................741
levels..................................................................................741
notice.................................................................................741
notification.....................................................................742
warning....................................................................741, 742
log sub-categories...............................................................768
log types
self.....................................................................................743
Log Viewer
about...................................................................................25
column settings............................................................772
Copyright © 2010, Juniper Networks, Inc.
creating an exempt rule ...........................................493
editing security policy rules......................................776
filtering...................................................................760, 768
find utility........................................................................768
flagging log events.......................................................767
generating a Quick Report.......................................825
hiding and moving columns.....................................772
integration with reports............................................824
linking to a device.........................................................776
log categories................................................................768
log entry event details................................................763
log ID.................................................................................768
log sub-categories......................................................768
predefined views..........................................................757
saving a view.................................................................760
saving custom views..................................................760
unknown values...........................................................763
using.................................................................................756
using ranges for filtering............................................770
log views
custom.............................................................................759
for EX Series devices...................................................757
Predefined......................................................................759
SSL/UAC predefined..................................................758
log, defined.............................................................................845
log2action
common filters............................................................800
exporting to CSV...............................................803, 804
exporting to script.......................................................807
exporting to SMTP (e-mail)...................................805
exporting to SNMP.....................................................804
exporting to syslog.....................................................806
exporting to XML.........................................................803
format-specific filters................................................803
logging
configuring in firewall rules......................................457
self log entries...............................................................745
Logs by User-set Flag report..................................814, 826
M
M Series devices
activating with dynamic IP address......................136
activating with static IP address............................134
adding multiple with discovery rules....................168
configuring.......................................................................197
configuring dual Routing Engines.........................236
importing with dynamic IP address.......................125
importing with static IP address..............................116
supported routers...........................................................18
Index
967

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents