Table 92: Log Entry Severity Levels for ScreenOS and IDP Devices
(continued)
Description
Severity
NSM Severity
Log entries triggered when traffic matches a major severity attack object.
Also includes log entries triggered by changes in the device function, such as
high availability (HA) status changes.
Critical
Major
Log entries triggered when traffic matches a minor severity attack object.
Also includes log entries triggered by errors in device function, such as a
failure in antivirus scanning or in communicating with SSH servers.
Error
Minor
Log entries triggered when traffic matches a warning severity attack object.
Also includes log entries triggered by questionable device activity, such as a
failure to connect to e-mail servers and authentication failures, timeouts,
and successes.
Warning
Device_warning_log
Log entries triggered when traffic matches an informational severity attack
object. Also includes log entries triggered by normal events, such as device
configuration changes.
Notification
Info
Log entries triggered by general system operations such as when a device
connects or disconnects.
Information
No severity is set.
Other
Not Set
NOTE:
From NSM release 2008.1 onwards, critical and warning logs from ScreenOS
and IDP devices are displayed as Device_critical_log and Device_warning_log. If upgrading
from an earlier release, you may need to modify your action manager criteria to match
the new conventions.
Viewing Logs
NSM logging tools provide a high-level view of the activity on your network, enabling you
to view summaries as well as detailed information. You can choose to view log entries
for an event that occurs across domains (you must have the requisite permissions), as
well as for specific device groups, clusters, firewalls, and so on.
Because you collect log entries from multiple devices, log analyzing, log volume, and log
management are important concerns. To control the amount of log data displayed on
screen, use tools such as filters, flags, and custom views to help identify patterns, and
even isolate log entries from devices that appear to be the source of problems. For further
investigation, use the Log Investigator tools to cross-tabulate source, destination, and
attacks. Based on your analysis, you can then edit the rules in your security policies to
modify how NSM handles your log entries.
NSM includes three primary logging modules:
•
Log Viewer—Presents complete, summarized, or detailed log-entry information in a
table format. You can view an individual log entry to analyze the raw log data, or use
Copyright © 2010, Juniper Networks, Inc.
732
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...