Traffic Log Entries; Policy Statistics; Attack Statistics; Ethernet Statistics - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide
750

Traffic Log Entries

The device generates traffic log entries when your device detects network traffic that
matches the source, destination, and service specified in a security policy rule.
To receive traffic log entries, you must:
Enable the device to generate traffic log entries for NSM in Report Settings > NSM.
Enable the device to send log entries with the desired severity settings to NSM.
Enable logging in the security policy installed on the device. For details on configuring
traffic logging in your security policy rules, see "Configuring Logging and Alerts" on
page 457.
Traffic log entries appear in the Log Viewer under the Traffic category. For details on
traffic subcategories, see "Traffic Log Entries" on page 953.

Policy Statistics

The device forwards statistics on the policy distribution of the traffic that entered the
device. Policy distribution statistics do not generate log entries; the statistics are used
by the Realtime Monitor module. For details on how policy distribution is displayed in
Realtime Monitor, see "Viewing Traffic Distribution by Security Policy" on page 668.

Attack Statistics

The device forwards statistics for attacks detected in the traffic that entered the device.
Attack statistics do not generate log entries; the statistics are used by the Realtime
Monitor module. For details on how attack statistics are displayed in the Realtime Monitor,
see "Viewing Attack Statistics" on page 677.

Ethernet Statistics

The device forwards statistics for Ethernet activity on the device. Ethernet statistics do
not generate log entries; the statistics are used by the Realtime Monitor module. For
details on how Ethernet statistics are displayed in Realtime Monitor, see "Viewing Ethernet
Statistics" on page 675.

Flow Statistics

The device forwards statistics for flows that entered the device. Flow statistics do not
generate log entries; the statistics are used by the Realtime Monitor . For details on how
flow statistics are displayed in the Realtime Monitor, see "Viewing Flow Statistics" on
page 676.

Protocol Distribution

The device forwards information on the protocol distribution of the traffic that entered
the device. Protocol distribution information does not generate log entries; the information
is used by the Realtime Monitor module. For details on how protocol distribution is
displayed in the Realtime Monitor, see "Viewing Traffic Distribution by Protocol" on
page 670.
The device reports statistics generated by the following services:
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents