NOTE:
The NSM MIB files resides in the
/usr/netscreen/DvrSvr/utils
directory
on the management system. The file names are
jnx.nsm-traps.mib
and
jnx-smi.mib
.
Exporting to CSV
For exporting to CSV, configure the following CSV settings:
•
File Path—The directory and filename that you want log entries exported to in .CSV
format.
•
Print Header—When selected, column headers are exported to .CSV format.
NSM uses this information when exporting qualified log entries to CSV. This setting
defines the CSV settings for the management system. To export logs to CSV, you must
select “CSV Enable” from the
Actions
tab in the
Device Log Action Criteria
node.
Exporting to XML
For exporting to XML, configure the directory and filename to which you want to send
qualified logs in XML format. NSM uses this information when exporting qualified log
entries to XML; each log becomes an XML record, which you can open in most Web
browsers.
This setting defines the XML settings for the management system. To actually export
logs to XML, you must select “XML Enable” from the
Actions
tab in the
Device Log Action
Criteria
node.
Exporting to E-mail
For exporting to e-mail, configure the following e-mail and SMTP settings:
•
SMTP Enable—Enables the SMTP server to send e-mail.
•
Default ‘From’ Email Address—Some servers require a valid “from” e-mail address to
relay mail.
•
Default ‘To’ Email Addresses—The e-mail address that receives e-mail alarms. You
can specify multiple “to” e-mail addresses.
NSM uses the preceding information when exporting qualified log entries to e-mail. These
settings define the e-mail and SMTP settings for the management system.
NOTE:
After editing your e-mail settings, you must restart the Device Server
for your changes to take effect
Setting Device Log Action Criteria
A
Device Log Action Criteria
instance defines the criteria for a qualified log; each instance
contains two criteria settings (category and severity), and multiple action settings for
logs that meet the criteria settings. For example, to only export critical severity attack
logs to XML, you create a device log action criteria instance that specifies the log category
Copyright © 2010, Juniper Networks, Inc.
798
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...