NSM applies the filter to all log entries and displays only the log entries that match the
specified protocol types.
Setting a Domain Filter
The Log Viewer displays log entries for a single domain at time. By default, when you log
in as the super administrator, the Log Viewer displays log entries for managed devices
in the global domain. To change the domain apply a domain filter to view log entries for
managed devices in a specific domain.
To create a domain filter, right-click the
Domain
column and select
Filter
>
Set Filter
.
Select the domain for which you want to view log entries, then click
OK
. NSM applies the
filter to all log entries and displays only the log entries that are generated from managed
devices in the specified domain.
Setting a Time-Based Filter
Apply a time-based filter to view log entries generated or received within a specific time
period. To create a time-based filter, right-click the
Time Generated
or
Time Received
column and select
Filter
>
Set Filter
:
•
To filter on a specific start time, select
From
and configure the start date and time.
When applied, this filter displays log entries for events that were generated or received
after or at the specified start time.
•
To filter on a specific end time, select
To
and configure the end date and time. When
applied, this filter displays log entries for events that were generated or received before
or at the specified end time.
•
To filter on a time period, select
From and To
, then enter the start and end date and
time. When applied, this filter displays log entries for events that were generated or
received within the specified time period.
In this example, you want to view all critical severity log entries that have a Follow-Up
flag assigned to them. Additionally, you want to limit the search to log entries generated
by the Engineering NSRP cluster on your network.
1.
In the Log Viewer, right-click the
Severity
column header and select
Filter
>
Set Filter
.
Select the checkbox for Critical, then click
OK
to save and apply the filter to your log
entries.
2.
Right-click the
User Flag
column header and select
Filter
>
Set Filter
. Enable
Follow-Up, then click
OK
to save and apply the filter to your log entries.
3.
Right-click the
Device
column header and select
Filter
>
Set Filter
. Select
Engineering
Cluster
, then click
OK
to save and apply the filter to your log entries.
Filtering Log Entries by Range
A range filter is a criteria search for matching log entries within a value range. You can
set a range filter for the following columns:
•
Bytes In
•
Bytes Out
Copyright © 2010, Juniper Networks, Inc.
770
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...