specifying a time period............................................770
timeline............................................................................755
using the Find utility...................................................758
viewing.............................................................................732
log entry severity
accepted destinations...............................................734
log events................................................................................730
log files
archive location............................................................785
archiving..........................................................................784
estimating required disk space..............................785
managing disk space.................................................783
setting storage limits..................................................784
log ID, defined........................................................................836
Log Investigator
about..................................................................................26
analyzing log entries...................................................775
configuring axes.............................................................771
configuring options.....................................................770
excluding data...............................................................778
filters.................................................................................773
filters, example..............................................................774
log entry analysis, types of.......................................776
setting data point count............................................772
setting data types.........................................................771
UI overview.....................................................................769
using.................................................................................768
log severity
alert....................................................................................731
critical.......................................................................731, 732
debug.................................................................................731
debugging.......................................................................734
emergency.......................................................................731
error...........................................................................731, 732
information.....................................................................732
informational..................................................................731
levels..................................................................................731
notice.................................................................................731
notification.....................................................................732
warning....................................................................731, 732
log sub-categories...............................................................758
log types
self.....................................................................................733
Log Viewer
about...................................................................................25
column settings............................................................762
creating an exempt rule ...........................................486
editing security policy rules.....................................766
filtering...................................................................750, 758
find utility........................................................................758
flagging log events.......................................................757
generating a Quick Report........................................815
hiding and moving columns.....................................762
integration with reports.............................................814
linking to a device........................................................766
log categories................................................................758
log entry event details................................................753
log ID.................................................................................758
log sub-categories.......................................................758
predefined views..........................................................747
saving a view.................................................................750
saving custom views..................................................750
unknown values............................................................753
using.................................................................................746
using ranges for filtering...........................................760
log views
custom.............................................................................749
for EX Series devices...................................................747
Predefined......................................................................749
SSL/UAC predefined..................................................748
log, defined.............................................................................835
log2action
common filters.............................................................790
exporting to CSV................................................793, 794
exporting to script........................................................797
exporting to SMTP (e-mail)....................................795
exporting to SNMP......................................................794
exporting to syslog......................................................796
exporting to XML..........................................................793
format-specific filters................................................793
logging
configuring in firewall rules.......................................451
self log entries...............................................................735
Logs by User-set Flag report..................................804, 816
M
M Series devices
activating with dynamic IP address......................136
activating with static IP address............................134
adding multiple with discovery rules....................166
configuring......................................................................195
configuring dual Routing Engines..........................234
importing with dynamic IP address.......................124
importing with static IP address..............................116
supported routers...........................................................18
main display area....................................................................25
managed devices.....................................................................13
management connection, modifying............................193
957
Copyright © 2010, Juniper Networks, Inc.
Index
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...