7.
Click the
Actions
tab and check
SMTP Enable
.
8.
Configure the target e-mail addresses for this rule, if they differ from the defaults you
configured in the previous steps.
Using the Action Manager to Forward Logs by Domain
Use the
Action Manager
node to configure the management system to perform actions
(such as syslog, export, or alarm) on log data based on the criteria you specify. These
actions occur for all the managed devices in a specific domain or subdomain.
To enable the management system to export logs, you must configure the following:
•
Action Parameters
—These settings define the default log export settings for the
management system, and determine how the system handles qualified log entries
(log entries that match specified log criteria).
•
Device Log Action Criteria
—The criteria specifies the category and severity of the log
entries you want to export. When a log entry meets the specified criteria, it is considered
qualified
, and NSM performs the specified actions defined in the criteria.
Configuring Action Parameters
From the
Action Manager
, select
Action Parameters
to define the default log export
settings for the management system. To enable the management system to export
qualified logs to the system log, SNMP, CSV, XML or e-mail, configure the export settings
for each format as detailed in the following sections. For every log action criteria, you can
specify and edit multiple system log and SNMP servers with their respective system log
server facilities and SNMP communities.
Exporting to the System Log
For exporting to the system log, configure the IP address and the server facility for all of
mulitple syslog servers to which you want to send qualified logs. NSM uses the specified
server when exporting qualified log entries to the system log.
To actually export logs to a system log server, you must select “Syslog Enable” using the
Actions
tab in the
Device Log Action Criteria
node.
Exporting to SNMP
For exporting to SNMP, configure the following SNMP settings:
•
SNMP Manager—Specify the IP addresses of the SNMP servers to which the GUI Server
sends SNMP traps.
•
SNMP Community—Specify SNMP community names that provide the desired
combination of both read and write access from the SNMP server.
NSM uses this information when exporting qualified log entries to SNMP. This setting
defines the SNMP settings for the management system. To actually export logs to the
specified SNMP servers and community, you must select “SNMP Enable” using the
Actions
tab in the
Device Log Action Criteria
node.
797
Copyright © 2010, Juniper Networks, Inc.
Chapter 19: Logging
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...