•
Show, hide, or move columns to customize the Log Viewer.
•
Filter log entries by column headings.
•
Create and save custom views that display your filters and column settings.
•
Set flags on Log Viewer entries to indicate a specific priority or action.
NSM supports log management for ScreenOS devices, IDP sensors, J Series devices, and
EX Series devices. NSM does not support log management for SRX Series devices, M
Series devices, and MX Series devices.
For more details on using the Log Viewer, see “Logging” on page 729.
Report Manager
The Report Manager contains summary, graphs, and charts that describe specific security
events that occur on your network. NSM generates reports to show the information
contained in your log entries. You can use reports to summarize security threats to your
network, analyze traffic behavior, and determine the efficiency of NSM. To share reports
or to use report information in other applications, you can print or export report data.
NSM supports report management for ScreenOS devices, IDP sensors, J Series devices,
and EX Series devices. NSM does not support report management for SRX Series devices,
M Series devices, and MX Series devices.
Log Investigator
The Log Investigator contains tools for analyzing your log entries in depth. Use the Log
Investigator to:
•
Manipulate and change constraints on log information.
•
Correlate log entries visually and rapidly.
•
Filter log entries while maintaining the broader picture.
Realtime Monitor
Realtime Monitor provides a graphical view of the current status of all devices managed
by NSM:
•
Device Monitor—Tracks the connection state and configuration state of your managed
devices. You can also view device details to see CPU utilization and memory usage for
each device, or check device statistics.
•
VPN Monitor—Tracks the status of all VPN tunnels.
•
NSRP Monitor—Tracks the status of security devices in clusters.
•
IDP Cluster Monitor—Tracks the status of IDP clusters.
You can customize Realtime Monitor to display only the information you want to see, as
well as to update information at specified intervals. You can also set alarm criteria for a
device or process. For more details on Realtime Monitor, see “Realtime Monitoring” on
page 649.
Copyright © 2010, Juniper Networks, Inc.
26
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...