Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1 Manual page 92

Configuring dsms
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1:
Table of Contents

Advertisement

86
J
N
UNIPER
ETWORKS
Step 3
Step 4
Step 5
S
A
ECURE
CCESS
Configure syslog server information for user access:
If a WELF:WELF file is configured, go to Step e. Otherwise, go to Step b.
a
From the left panel, select System > Log/Monitoring > User Access > Filter.
b
The Filter menu appears.
Click New Filter.
c
Select WELF. Click Save Changes.
d
From the left panel, select System > Log/Monitoring > User Access >
e
Settings.
From the Select Events to Log section, select the events that you wish to log.
f
In the Server name/IP field, enter the name or IP address of the syslog server.
g
From the Facility drop-down list box, select the facility.
h
From the Filter drop-down list box, select WELF:WELF. Click Add and click
i
Save Changes.
Configure syslog server information for administrator access:
If a WELF:WELF file is configured, go to Step e. Otherwise, go to Step b.
a
From the left panel, select System > Log/Monitoring > Admin Access >
b
Filter.
The Filter menu appears.
Click New Filter.
c
Select WELF. Click Save Changes.
d
From the left panel, select System > Log/Monitoring > Admin Access >
e
Settings.
From the Select Events to Log section, select the events that you wish to log.
f
In the Server name/IP field, enter the name or IP address of the syslog server.
g
From the Facility drop-down list box, select the facility.
h
From the Filter drop-down list box, select WELF:WELF. Click Add and click
i
Save Changes.
Configure syslog server information for client logs:
If a WELF:WELF file is configured, go to Step e. Otherwise, go to Step b.
a
From the left panel, select System > Log/Monitoring > Client Logs > Filter.
b
The Filter menu appears.
Click New Filter.
c
Select WELF. Click Save Changes.
d
From the left panel, select System > Log/Monitoring > Client Logs >
e
Settings.
From the Select Events to Log section, select the events that you wish to log.
f
Configuring DSMs Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents