security policy rule. When matched in a rule, protocol anomaly attack objects, signature
attack objects, and custom attack objects all generate Deep Inspection alarm log entries
that appear in the Log Viewer.
To receive Deep Inspection alarm log entries, you must:
•
Enable the device to generate Deep Inspection alarm log entries for NSM in
Report
Settings
>
NSM
.
•
Enable the device to send log entries with the desired severity settings to NSM in
Report
Settings
>
General
>
NSM
.
•
Enable Deep Inspection detection in the security policy installed on the device. For
details on configuring Deep Inspection logging in your security policy rules, see
“Configuring a DI Profile/Enable IDP for Firewall Rules” on page 457.
Deep Inspection alarm log entries appear in the Log Viewer and display the following
columns of information in the Log Viewer:
•
Source Address
•
Destination Address
•
Service
•
Action
•
Category (Predefined or Custom)
•
Subcategory (for details on Deep Inspection alarm subcategories, see “Deep Inspection
Alarm Log Entries” on page 864)
•
Severity
Configuration Log Entries
The device generates configuration log entries for events that change the configuration
on the device. Specifically, any command issued that the ScreenOS
get config
command
statement captures and displays in ScreenOS generates a configuration log. For each
configuration change, the device generates a configuration log entry that contains
information about the change in the Log Viewer Detail column.
To receive configuration log entries, you must:
•
Enable the device to generate configuration log entries for NSM in
Report Settings
>
NSM
.
•
Enable the device to send log entries with a notification severity setting to NSM in
Report Settings
>
General
>
NSM
.
Configuration log entries appear in the Log Viewer under the category Configuration. For
details on configuration subcategories, see “Configuration Log Entries” on page 939.
Information Log Entries
The device generates information logs when it detects that an administrator has made
a change to the basic settings of the device, such as logging in or out, setting a new
Copyright © 2010, Juniper Networks, Inc.
738
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...