NSM uses this information when exporting qualified log entries to CSV. This setting
defines the CSV settings for the management system. To export logs to CSV, you must
select “CSV Enable” from the
Actions
tab in the
Device Log Action Criteria
node.
Exporting to XML
For exporting to XML, configure the directory and filename to which you want to send
qualified logs in XML format. NSM uses this information when exporting qualified log
entries to XML; each log becomes an XML record, which you can open in most Web
browsers.
This setting defines the XML settings for the management system. To actually export
logs to XML, you must select “XML Enable” from the
Actions
tab in the
Device Log Action
Criteria
node.
Exporting to E-mail
For exporting to e-mail, configure the following e-mail and SMTP settings:
•
SMTP Enable—Enables the SMTP server to send e-mail.
•
Default ‘From’ Email Address—Some servers require a valid “from” e-mail address to
relay mail.
•
Default ‘To’ Email Addresses—The e-mail address that receives e-mail alarms. You
can specify multiple “to” e-mail addresses.
NSM uses the preceding information when exporting qualified log entries to e-mail. These
settings define the e-mail and SMTP settings for the management system.
NOTE:
After editing your e-mail settings, you must restart the Device Server for your
changes to take effect
Setting Device Log Action Criteria
A
Device Log Action Criteria
instance defines the criteria for a qualified log; each instance
contains two criteria settings (category and severity), and multiple action settings for
logs that meet the criteria settings. For example, to only export critical severity attack
logs to XML, you create a device log action criteria instance that specifies the log category
as predefined, the severity as critical, and the action as XML. For each log entry that
matches the criteria, NSM exports the log as XML, using the default XML settings
configured in the
Actions
tab.
To add a new
Device Log Action Criteria
instance, use the
Add
button, then configure
the following settings.
Selecting Category
In the Category list, select a category of log entry for the criteria. Some categories contain
subcategories; however, to set an action based on a subcategory, you must first select
a category.
For details on each category and subcategory, see “Log Entries” on page 861.
Copyright © 2010, Juniper Networks, Inc.
788
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...