Information Log Entries; Self Log Entries - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.

Information Log Entries

The device generates information logs when it detects that an administrator has made
a change to the basic settings of the device, such as logging in or out, setting a new
password for the device, issuing a key value for the device, or entering an MD5
authentication password to enter a device. For each administrative change, the device
generates an information log entry that contains information about the change in the
Log Viewer Detail column.
To receive information log entries, you must:
Enable the device to generate information log entries for NSM in Report Settings >
NSM.
Enable the device to send log entries with the info, warning, and error severity settings
to NSM in Report Settings > General > NSM.
Information log entries appear in the Log Viewer under the category Information. For
details on information subcategories, see "Information Log Entries" on page 951.

Self Log Entries

The device generates self log entries for any packet that terminates at the device. Self
log entries display information on traffic that was dropped by the device or that terminates
on the device.
To receive self log entries, you must:
Enable the device to generate self log entries for NSM in Report Settings > NSM.
Enable the device to send specific self log entries to NSM in Report Settings > General
> Firewall Options. For details, see "Forwarding Self Log Entries (Firewall Options)"
on page 745.
Self log entries appear in the Log Viewer under the category Self, which contains
information in the following Log Viewer columns:
Source
Destination
Services
Self log entries have the category "Self" and the subcategory "Self Log".
NOTE: In some cases, Junos devices return log messages in syslog format,
which map to "Self" for Category and Subcategory columns. Consequently,
self log entries are not necessarily the result of packets that terminate at the
device or packets that were dropped by a security device.
Chapter 19: Logging
749

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents