Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 330

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
Related
Documentation
312
Table 93: Log Filter Configuration Details (continued)
Option
End Date
Query
Format Type
Configuring Client-Side Logs (NSM Procedure) on page 310
Configuring Custom Filters and Formats for Log Files (NSM Procedure) on page 308
Function
Specifies the date up to
which logs have to be
written.
Specifies the custom
expression language to
control which subset of
data the Secure Access
device writes to the log.
Specifies the format of the
data in the log.
Your Action
Enter an end date.
To use the Secure Access device
custom expression language:
1.
Click the New Expression button.
The Custom Expression editor is
displayed.
2. Select the variable from the
Expression Dictionary and click the
Insert Expression button.
3. Click the Validate button to
validate the expression.
4. Click OK to save the custom
expression.
Select one of the following format
types:
Standard: This log filter format logs
the date, time, node, source IP
address, user, realm, and the
Secure Access device event ID and
message.
WELF: This customized WebTrends
Enhanced Log Format (WELF) filter
combines the standard WELF
format with information about the
Secure Access device's realms,
roles, and messages.
W3C: The World Wide Web
Consortium's extended log file
format is a customizable ASCII
format with a variety of different
http://www.w3.org
fields. Visit
for more information about this
format. Only the User Access log
offers this filter as an option.
Custom: Enter the format you want
to use in Custom Format. When
entering a format, surround
variables with percentage symbols
(for example %user%). All other
characters in the field are treated
as literals.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents