searching by ID.............................................................768
severity levels.................................................................741
SNMP.................................................................................751
specifying a time period...........................................780
timeline............................................................................765
using the Find utility...................................................768
viewing.............................................................................742
log entry severity
accepted destinations...............................................744
log events................................................................................740
log files
archive location............................................................796
archiving..........................................................................794
estimating required disk space..............................795
managing disk space..................................................793
setting storage limits..................................................795
log ID, defined.......................................................................846
Log Investigator
about..................................................................................26
analyzing log entries...................................................785
configuring axes............................................................781
configuring options.....................................................780
excluding data..............................................................788
filters.................................................................................783
filters, example.............................................................784
log entry analysis, types of......................................786
setting data point count............................................782
setting data types.........................................................781
UI overview.....................................................................779
using..................................................................................778
log severity
alert....................................................................................741
critical.......................................................................741, 742
debug.................................................................................741
debugging.......................................................................744
emergency.......................................................................741
error...........................................................................741, 742
information.....................................................................742
informational..................................................................741
levels..................................................................................741
notice.................................................................................741
notification.....................................................................742
warning....................................................................741, 742
log sub-categories...............................................................768
log types
self.....................................................................................743
Log Viewer
about...................................................................................25
column settings............................................................772
creating an exempt rule ...........................................493
editing security policy rules......................................776
filtering...................................................................760, 768
find utility........................................................................768
flagging log events.......................................................767
generating a Quick Report.......................................825
hiding and moving columns.....................................772
integration with reports............................................824
linking to a device.........................................................776
log categories................................................................768
log entry event details................................................763
log ID.................................................................................768
log sub-categories......................................................768
predefined views..........................................................757
saving a view.................................................................760
saving custom views..................................................760
unknown values...........................................................763
using.................................................................................756
using ranges for filtering............................................770
log views
custom.............................................................................759
for EX Series devices...................................................757
Predefined......................................................................759
SSL/UAC predefined..................................................758
log, defined.............................................................................845
log2action
common filters............................................................800
exporting to CSV...............................................803, 804
exporting to script.......................................................807
exporting to SMTP (e-mail)...................................805
exporting to SNMP.....................................................804
exporting to syslog.....................................................806
exporting to XML.........................................................803
format-specific filters................................................803
logging
configuring in firewall rules......................................457
self log entries...............................................................745
Logs by User-set Flag report..................................814, 826
M
M Series devices
activating with dynamic IP address......................136
activating with static IP address............................134
adding multiple with discovery rules....................168
configuring.......................................................................197
configuring dual Routing Engines.........................236
importing with dynamic IP address.......................125
importing with static IP address..............................116
supported routers...........................................................18
967
Copyright © 2010, Juniper Networks, Inc.
Index
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...