Figure 104: Sample Packet Data; Using The Log Viewer - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Using the Log Viewer

756

Figure 104: Sample Packet Data

The Log Viewer displays log entries generated by a managed device when traffic matches
a firewall or VPN rule, or when an event occurs that matches a predefined set of
conditions. The main display of the Log Viewer displays summarized information about
security events and alarms, while the detail panes provide more detailed information
about a specific log entry.
This section provides details on the following Log Viewer functionality:
"Using Log Views" on page 757—The Log Viewer includes several predefined views for
critical severity attacks, configuration log entries, scans, and other important activity.
This section describes how to use filters to create your own unique, customized log
entry view, then save the custom view (with all its filters) for future use.
"Searching Log Entries" on page 764—For networks that generate large numbers of log
entries, it can be difficult to locate the exact log entries that detail the events you want
to investigate. This section describes how to use the log timeline to find logs generated
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents