•
Trap Port—The number of the port assigned to transmit traps that have been generated
by an SNMP alarm, threshold violation, or error.
•
Enable Authentication Fail Trap—Specifies whether you want to generate a trap if a
packet fails to be authenticated when attempting to enter the device. Select this option
if the device sends SNMP messages through a VPN tunnel.
Next, configure SNMP communities. To send traps, the SNMP agent on the device requires
that you define communities, their associated hosts, and assign permissions (read/write
or read-only). You can create up to three (3) SNMP communities, with up to eight (8)
hosts in each community.
To create an SNMP community, click the
Add
icon under
Community Settings
and
configure the following settings:
•
Community name—The device uses the community name to authorize users attempting
to enter the device.
•
Access Mode—Defines read-write or read-only privileges for the community.
•
Trap Mode—When enabled (On), enables the device to send an SNMP trap for illegal
SNMP connections attempts to the device.
•
Traffic—When enabled, the device can accept traffic from the source interface.
•
Version—Defines the versions supported by the community (SNMPv1, SNMPv2c, or
both SNMP versions, as required by the SNMP management stations). For backward
compatibility with earlier ScreenOS releases that only support SNMPv1, security devices
support SNMPv1 by default.
•
Hosts—Define one or more hosts that are associated with the community. Click the
Add
icon, then specify the host IP address and netmask, the trap version for the host
(if an SNMP community supports both SNMPv1 and SNMPv2c, you must specify a trap
version for each community member), and the source interface.
Directing Logs to a Syslog Server
A managed device can generate syslog messages for system events at predefined severity
levels and optionally for traffic that policies permit across a firewall. It sends these
messages via UDP (port 514) to up to four designated syslog hosts running on UNIX/Linux
systems. When you enable syslog reporting, you also specify which interface the devices
use to send syslog packets.
You can configure the syslog server settings at the device level, or skip this section and
configure the GUI server to handle syslog messages; see “Exporting to the System Log”
on page 787.
To send log entries to a Syslog server, click the
Syslog
option. NSM displays the
Syslog
dialog box. Enter appropriate data into the following fields. See Table 96 on page 743.
Copyright © 2010, Juniper Networks, Inc.
742
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...