Configuring Custom Log Filters (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation

Configuring Custom Log Filters (NSM Procedure)

Copyright © 2010, Juniper Networks, Inc.
Table 92: Configuring Client-Side Logs Details (continued)
Option
Function
Terminal Servers
Secure Access device writes
client-side logs of Terminal Servers.
Upload logs disk
Specifies the amount of disk space (in
space (MB)
Megabytes) you want to allocate for
uploaded client log files.
Alert when log
Secure Access device displays an alert
uploaded
message when an end-user pushes a
log file up to the Secure Access
device.
Viewing Device Monitor Alarm Status on page 316
Configuring User Access, Admin Access, Events and Sensors (NSM Procedure) on
page 305
You can create custom log filters or edit the set of predefined log filters to specify which
data is written to your log files as well as its format.
To configure the log filters:
In the NSM navigation tree, select Device Manager > Devices.
1.
Click the Device Tree tab, and then double-click the Secure Access device for which
2.
you want to configure log filter.
Click the Configuration tab. In the configuration tree, select System > Log/Monitoring
3.
> Filters.
Add or modify settings as specified in Table 93 on page 311.
4.
Click one:
5.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 93: Log Filter Configuration Details
Option
Filter Name
Start Date
Chapter 23: Configuring Logs in Secure Access Devices
Function
Specifies a name for the
filter.
Specifies the date from
which logs have to be
written.
Your Action
Select the Terminal Servers to
enable this feature.
Enter the disk space.
NOTE: You can allocate from 0
to 200 MB.
Select Alert when log uploaded
to enable this feature.
Your Action
Enter a name for the filter.
Enter a start date.
311

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents