•
Enable the device to send log entries with the desired severity settings to NSM.
•
Enable logging in the security policy installed on the device. For details on configuring
traffic logging in your security policy rules, see “Configuring Logging and Alerts” on
page 451.
Traffic log entries appear in the Log Viewer under the Traffic category. For details on
traffic subcategories, see “Traffic Log Entries” on page 943.
Policy Statistics
The device forwards statistics on the policy distribution of the traffic that entered the
device. Policy distribution statistics do not generate log entries; the statistics are used
by the
Realtime Monitor
module. For details on how policy distribution is displayed in
Realtime Monitor
, see “Viewing Traffic Distribution by Security Policy” on page 658.
Attack Statistics
The device forwards statistics for attacks detected in the traffic that entered the device.
Attack statistics do not generate log entries; the statistics are used by the Realtime
Monitor module. For details on how attack statistics are displayed in the Realtime Monitor,
see “Viewing Attack Statistics” on page 667.
Ethernet Statistics
The device forwards statistics for Ethernet activity on the device. Ethernet statistics do
not generate log entries; the statistics are used by the Realtime Monitor module. For
details on how Ethernet statistics are displayed in Realtime Monitor, see “Viewing Ethernet
Statistics” on page 665.
Flow Statistics
The device forwards statistics for flows that entered the device. Flow statistics do not
generate log entries; the statistics are used by the Realtime Monitor . For details on how
flow statistics are displayed in the Realtime Monitor, see “Viewing Flow Statistics” on
page 666.
Protocol Distribution
The device forwards information on the protocol distribution of the traffic that entered
the device. Protocol distribution information does not generate log entries; the information
is used by the Realtime Monitor module. For details on how protocol distribution is
displayed in the Realtime Monitor, see “Viewing Traffic Distribution by Protocol” on
page 660.
The device reports statistics generated by the following services:
•
AH (Authentication Header)
•
ESP (Encapsulating Security Payload)
•
GRE (Generic Routing Encapsulation)
•
ICMP (Internet Control Message Protocol)
•
OSPF (Open Shortest Path First)
Copyright © 2010, Juniper Networks, Inc.
740
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...