•
Listen Port—The number of the port assigned to monitor SNMP traffic (listen and
transmit SNMP traps).
•
Trap Port—The number of the port assigned to transmit traps that have been generated
by an SNMP alarm, threshold violation, or error.
•
Enable Authentication Fail Trap—Specifies whether you want to generate a trap if a
packet fails to be authenticated when attempting to enter the device. Select this option
if the device sends SNMP messages through a VPN tunnel.
Next, configure SNMP communities. To send traps, the SNMP agent on the device requires
that you define communities, their associated hosts, and assign permissions (read/write
or read-only). You can create up to three (3) SNMP communities, with up to eight (8)
hosts in each community.
To create an SNMP community, click the
Add
icon under
Community Settings
and
configure the following settings:
•
Community name—The device uses the community name to authorize users attempting
to enter the device.
•
Access Mode—Defines read-write or read-only privileges for the community.
•
Trap Mode—When enabled (On), enables the device to send an SNMP trap for illegal
SNMP connections attempts to the device.
•
Traffic—When enabled, the device can accept traffic from the source interface.
•
Version—Defines the versions supported by the community (SNMPv1, SNMPv2c, or
both SNMP versions, as required by the SNMP management stations). For backward
compatibility with earlier ScreenOS releases that only support SNMPv1, security devices
support SNMPv1 by default.
•
Hosts—Define one or more hosts that are associated with the community. Click the
Add
icon, then specify the host IP address and netmask, the trap version for the host
(if an SNMP community supports both SNMPv1 and SNMPv2c, you must specify a trap
version for each community member), and the source interface.
Directing Logs to a Syslog Server
A managed device can generate syslog messages for system events at predefined severity
levels and optionally for traffic that policies permit across a firewall. It sends these
messages via UDP (port 514) to up to four designated syslog hosts running on UNIX/Linux
systems. When you enable syslog reporting, you also specify which interface the devices
use to send syslog packets.
You can configure the syslog server settings at the device level, or skip this section and
configure the GUI server to handle syslog messages; see “Exporting to the System Log”
on page 797.
To send log entries to a Syslog server, click the
Syslog
option. NSM displays the
Syslog
dialog box. Enter appropriate data into the following fields. See Table 96 on page 753.
Copyright © 2010, Juniper Networks, Inc.
752
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...