It may be helpful to visualize log entries being sent or
pushed
from the device to the NSM
Device Server, which then pushes the log entries to the logging database. A UI module
(the Log Viewer or
Report Manager
) requests or pulls the log entries in the logging
database and displays the entries in the UI.
About Log Entries
A managed device generates a log entry when an event matches the configured logging
conditions. The log entry, which contains details of the event, is sent to the NSM Device
Server and stored in the logging database. You can view log entries in the NSM UI.
In a single log entry, you can view detailed information about where traffic comes from
(the source address), where traffic goes (the destination address), and a description of
the event that triggered the log entry. You can also view summarized information about
events and alarms for multiple log entries. This data can help you analyze log entries and
determine the effectiveness of your current security policies and device configurations.
About Log Events
Managed devices generate log entries based on events. Typically, devices generate log
entries when:
•
An event matches a rule in which logging is enabled. When you configure a rule for
logging, the device creates a log entry for each event that matches that rule.
•
An event matches a predefined set of conditions configured on a managed device or
the management system.
Some events generate log entries that appear in the Log Viewer, while others appear in
the Realtime Monitor. Table 90 on page 730 details event-generated log entries.
Table 90: Event-Generated Log Entries
Destination
Description
Events
Log Viewer
Generates log entries for events related to network activity on the device
that violates a set threshold.
Attack, Alarm, Other
Realtime Monitor
>VPN Monitor
Generates log entries for events related to VPN tunnels. These log entries
are used to produce statistical information for monitoring.
VPN Events
Log Viewer
Generates log entries for events related to device configuration, NSM
configuration, security policy rules, and traffic activity on the managed
device.
Configuration,
Information, Self, Policy,
Traffic
Realtime Monitor
>Device Monitor
Generates log entries for events related to packet flow, Ethernet objects,
network attacks, and security policy rules. These log entries are used to
produce statistical information for monitoring.
Flow, Ethernet, Attack,
Policy
Realtime Monitor
>Device Monitor
Generates log entries for events related to protocols used in network
activity. These log entries are used to produce statistical information for
monitoring.
Protocol Distribution
Copyright © 2010, Juniper Networks, Inc.
730
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...