Figure 43: Search Results Dialog Box
Error Logs
To review error logs, select
Troubleshooting > Error Logs
. Figure 44 on page 63 shows
an example,
Figure 44: Review Error Logs
To view details of an individual error log, select the file you want to view and click
View
.
Figure 45 on page 63 shows sample error log details.
Figure 45: Error Log Detail
63
Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring NSM from the Web Interface
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 10: ...Copyright 2010 Juniper Networks Inc x NSMXpress Series II User Guide...
Page 14: ...Copyright 2010 Juniper Networks Inc xiv NSMXpress Series II User Guide...
Page 22: ...Copyright 2010 Juniper Networks Inc 2 NSMXpress Series II User Guide...
Page 88: ...Copyright 2010 Juniper Networks Inc 68 NSMXpress Series II User Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 70 NSMXpress Series II User Guide...
Page 96: ...Copyright 2010 Juniper Networks Inc 76 NSMXpress Series II User Guide...
Page 99: ...PART 3 Index Index on page 81 79 Copyright 2010 Juniper Networks Inc...
Page 100: ...Copyright 2010 Juniper Networks Inc 80 NSMXpress Series II User Guide...
Page 104: ...Copyright 2010 Juniper Networks Inc 84 NSMXpress Series II User Guide...