Deep Inspection Alarm Log Entries
The device generates Deep Inspection alarm log entries when a device with Deep
Inspection (DI) detects network traffic that matches an attack object specified in a
security policy rule. When matched in a rule, protocol anomaly attack objects, signature
attack objects, and custom attack objects all generate Deep Inspection alarm log entries
that appear in the Log Viewer.
To receive Deep Inspection alarm log entries, you must:
•
Enable the device to generate Deep Inspection alarm log entries for NSM in
Report
Settings
>
NSM
.
•
Enable the device to send log entries with the desired severity settings to NSM in
Report
Settings
>
General
>
NSM
.
•
Enable Deep Inspection detection in the security policy installed on the device. For
details on configuring Deep Inspection logging in your security policy rules, see
“Configuring a DI Profile/Enable IDP for Firewall Rules” on page 463.
Deep Inspection alarm log entries appear in the Log Viewer and display the following
columns of information in the Log Viewer:
•
Source Address
•
Destination Address
•
Service
•
Action
•
Category (Predefined or Custom)
•
Subcategory (for details on Deep Inspection alarm subcategories, see “Deep Inspection
Alarm Log Entries” on page 874)
•
Severity
Configuration Log Entries
The device generates configuration log entries for events that change the configuration
on the device. Specifically, any command issued that the ScreenOS
get config
command
statement captures and displays in ScreenOS generates a configuration log. For each
configuration change, the device generates a configuration log entry that contains
information about the change in the Log Viewer Detail column.
To receive configuration log entries, you must:
•
Enable the device to generate configuration log entries for NSM in
Report Settings
>
NSM
.
•
Enable the device to send log entries with a notification severity setting to NSM in
Report Settings
>
General
>
NSM
.
Configuration log entries appear in the Log Viewer under the category Configuration. For
details on configuration subcategories, see “Configuration Log Entries” on page 949.
Copyright © 2010, Juniper Networks, Inc.
748
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...