Customizing Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772
Using Column Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772
Hide, Unhide, and Move Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772
Filtering Log Entries by Column . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 774
Using Log Viewer Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 776
Jump to Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 776
Jump to Device Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 776
Identifying Irrelevant Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777
Using the Log Investigator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 778
About the Log Investigator UI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 779
Configuring Log Investigator Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 780
Configuring a Time Period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 780
Configuring Axes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 781
Setting a Log Entry Limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 782
Setting Log Investigator Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783
Example: Setting Filters in the Log Investigator . . . . . . . . . . . . . . . . . . . 784
Investigating Log Entry Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 785
Using Rows and Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 785
Using Cells . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786
Zoom Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 787
Jumping to the Log Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 788
Excluding Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 788
Using the Audit Log Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 788
Audit Log Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 789
Managing the Audit Log Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 790
Target View and Device View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 792
Setting a Start Time for Audit Log Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . 792
Managing Log Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793
Automatic Device Log Cleanup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793
Archiving Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 794
Log Archival Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 794
Setting Log Storage Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
Date Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
System-wide Retention Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
Obsolete Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
Required Disk Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
Archive Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795
Forwarding Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796
Sending E-mail Notification of Downed Device . . . . . . . . . . . . . . . . . . . . . . 796
Using the Action Manager to Forward Logs by Domain . . . . . . . . . . . . . . . . . 797
Configuring Action Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797
Setting Device Log Action Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 798
Using the log2action Utility to Export Logs . . . . . . . . . . . . . . . . . . . . . . . . . . 800
Using Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 800
Exporting to XML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803
Using XML Required and Optional Format-Specific Filters . . . . . . . . . . 803
Viewing XML Format Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803
Exporting to CSV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803
Using CSV Required and Optional Format-Specific Filters . . . . . . . . . . 804
xxxiii
Copyright © 2010, Juniper Networks, Inc.
Table of Contents
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...