Table 91: Custom Filters and Formats for Log Files Configuration
Details
(continued)
Your Action
Function
Option
Enter the custom expression.
NOTE: Any string (including a * wildcard
character) you manually enter in a query must be
enclosed in double-quotes.
Allows the user to view the logs
in different formats.
Query
Select one of the following options:
•
Standard
—This log filter format logs the date,
time, node, source IP address, user, realm, and
the Secure Access device event ID and
message.
•
WELF
—This customized WebTrends Enhanced
Log Format (WELF) filter combines the
standard WELF format with information about
the Secure Access device realms, roles, and
messages.
•
W3C
—The World Wide Web Consortium’s
extended log file format is a customizable ASCII
format with a variety of different fields. Visit
http://www.w3.org for more information about
this format. Only the User Access log offers this
filter as an option.
•
Custom
—Allows you to enter the format you
want to use.
Specifies the format of the
data in the log.
Format
Type
Enter the format.
NOTE: When entering a format, surround
variables with percentage symbols (for example
%user%
). All other characters are treated as
literals.
Customizes the format of the
data in the log.
NOTE: This box is enabled only
when you select
Custom
from
the Format Type drop-down
list.
Custom
Format
Related
Documentation
Configuring Client-Side Logs (NSM Procedure) on page 310
•
•
Viewing Device Status on page 313
309
Copyright © 2010, Juniper Networks, Inc.
Chapter 23: Configuring Logs in Secure Access Devices
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...