Figure 118: Top Configuration Changes Report; Example: Using Ex Switch Reports To Track Configuration Changes; Example: Using Ssl/Vpn Reports To Track Authentication Failures - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Example: Using EX Switch Reports to Track Configuration Changes

Example: Using SSL/VPN Reports to Track Authentication Failures

828
In this example, you are a switch administrator responsible for configuring all the managed
switches in your network. You routinely update your switch configurations after hours.
To track those switches that have undergone the most configuration changes , you
generate a "Top Configuration Changes" report each night.
During the week, you can generate a similar report to track switches that have undergone
the most configuration changes committed during the past seven days. Figure 118 on
page 828 shows the Top Configuration Changes report.
In this example, you are a security administrator responsible for tracking users on the
SSL/VPN security devices on your network. You routinely watch for unauthorized users
attempting to access your network by tracking authentication failures. To keep watch
for potential hackers, you can generate a "Top 10 auth failures for user@realm" report
each night.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents