column, and the destination IP address of an attack appears in the destination address
column.
•
Alarms—To quickly access log entries generated by a policy rule that contains an alarm,
create a view that filters on the alarm column. This method is useful when you are
fine-tuning policies to distinguish between genuine attacks and false positives.
•
Devices—To manage devices in multiple locations that use different investigation
processes, create a separate view for each device at a specific location.
You can create and save custom views using one of the following methods:
•
Create New View—In the navigation tree, select the Log Viewer module. From the
File
menu, select
New View
. In the
New View
dialog box, enter a name for the custom view,
enter a name for the folder that you want to save the view in, and click
OK
. The new
view is displayed in the navigation tree in the folder specified. By default, all new views
are saved in the Others folder. In the main display area, you can then set the desired
filters for the log entries.
•
Set Filters—In the Log Viewer main display area, set the desired filters for the view.
From the
File
menu, select
Save As
. In the
New View
dialog box, enter a name for the
custom view, enter a name for the folder that you want to save the view in, and click
OK
. The new view is displayed in the navigation tree in the folder specified.
Creating Per-Session Views
Log views that you create on the fly, also called “transient” views, (views set from filters
defined in the Report Manager), appear in the
Drill Down
folder under Log Viewer. These
views remain in this folder until you log out of the UI.
Log Viewer Columns
The Log Viewer contains the columns in Table 101 on page 760. When filtering by column,
the filter affects all log entries.
Table 101: Log Viewer Columns
Meaning
Default
Column
The unique identifier ID for the log entry. The log ID comprises
both a date and an incrementing integer.
Default
Log ID
The date and the time that the Log Viewer received the log
entry.
Default
Time Received
Indicates whether an alert flag was generated in response to
the event that generated the log entry.
Default
Alert
The UI assignable flag associated with the current log.
Default
User Flag
The source address of the packet that generated the log.
No
Src Addr
The destination device to which the packet associated with
the log entry was targeted.
Default
Dst Addr
Copyright © 2010, Juniper Networks, Inc.
760
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...