Table 83: Management System Utilities
(continued)
Description
Name
Exports Audit Log data to a csv file or Syslog server.
CSV Command Usage:
For csv file, issue the
csv
command:
./xdbAuditLogConverter.sh
<xdb root> csv [csv full file path]
For example,
. /xdbAuditLogConverter.sh
/usr/netscreen/GuiSvr/var/xdb csv /tmp/audit.csv
This creates a file called
audit.csv
in the
/tmp
directory with audit
logs in csv format. If the csv file path is not specified, audit logs in
csv format are written to a default file called
auditlog.csv
in the
current directory.
Syslog Command Usage:
To export data to a Syslog server, issue the
syslog
command:
.
/xdbAuditLogConverter.sh <xdb root> syslog [remote IP Address]
For example,
./xdbAuditLogConverter.sh
/usr/netscreen/GuiSvr/var/xdb syslog 172.23.9.94
If you want to syslog to the host machine on which you are running
this command, do not specify an IP address. For example,
./xdbAuditLogConverter.sh /usr/netscreen/GuiSvr/var/xdb syslog
xdbAuditLogConverter.sh
In NSM, enhancements to the audit log exporter tool allow you to:
•
Invoke detailed help messages from the audit log exporter tool with
./.xdbAuditLogConverter- - help
•
Use
- -showdiff
to view audit log details before and after a modification. This feature
is only supported on objects such as addresses, NAT, VLAN objects, access profiles,
VSYS profiles and so on. It is not supported on policies.
•
View details about modifications to objects (add, delete, modify actions) in the audit
log output. For example,
ACTION=delete,ADMIN=super,DEVICE=,TARGET=addressObj/address/global,TIME=Tue
Dec 30 11:02:49 2008
•
Filter exported audit log data according to Date/Time and Date/Time Range, Device,
Action, Admin, Domain, Working Domain. Multiple filters are also allowed. For example,
./.xdbAuditLogConverter <xdb path> <csv|syslog> [CSV full filepath | Remote IP
Address] - -domain=<domain id> - -device =<device name>
Using Schema Information
From NSM, you can select
Schema Information
to view current and running schema and
update schema for devices whose schema are defined using XML.
Copyright © 2010, Juniper Networks, Inc.
706
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...