It may be helpful to visualize log entries being sent or
pushed
from the device to the NSM
Device Server, which then pushes the log entries to the logging database. A UI module
(the Log Viewer or
Report Manager
) requests or pulls the log entries in the logging
database and displays the entries in the UI.
About Log Entries
A managed device generates a log entry when an event matches the configured logging
conditions. The log entry, which contains details of the event, is sent to the NSM Device
Server and stored in the logging database. You can view log entries in the NSM UI.
In a single log entry, you can view detailed information about where traffic comes from
(the source address), where traffic goes (the destination address), and a description of
the event that triggered the log entry. You can also view summarized information about
events and alarms for multiple log entries. This data can help you analyze log entries and
determine the effectiveness of your current security policies and device configurations.
About Log Events
Managed devices generate log entries based on events. Typically, devices generate log
entries when:
•
An event matches a rule in which logging is enabled. When you configure a rule for
logging, the device creates a log entry for each event that matches that rule.
•
An event matches a predefined set of conditions configured on a managed device or
the management system.
Some events generate log entries that appear in the Log Viewer, while others appear in
the Realtime Monitor. Table 90 on page 740 details event-generated log entries.
Table 90: Event-Generated Log Entries
Destination
Description
Events
Log Viewer
Generates log entries for events related to network activity on the device
that violates a set threshold.
Attack, Alarm, Other
Realtime Monitor
>VPN Monitor
Generates log entries for events related to VPN tunnels. These log entries
are used to produce statistical information for monitoring.
VPN Events
Log Viewer
Generates log entries for events related to device configuration, NSM
configuration, security policy rules, and traffic activity on the managed
device.
Configuration,
Information, Self, Policy,
Traffic
Realtime Monitor
>Device Monitor
Generates log entries for events related to packet flow, Ethernet objects,
network attacks, and security policy rules. These log entries are used to
produce statistical information for monitoring.
Flow, Ethernet, Attack,
Policy
Realtime Monitor
>Device Monitor
Generates log entries for events related to protocols used in network
activity. These log entries are used to produce statistical information for
monitoring.
Protocol Distribution
Copyright © 2010, Juniper Networks, Inc.
740
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...