Table 91: Custom Filters and Formats for Log Files Configuration
Details
(continued)
Your Action
Function
Option
Enter the custom expression.
NOTE: Any string (including a * wildcard
character) you manually enter in a query must be
enclosed in double-quotes.
Allows the user to view the logs
in different formats.
Query
Select one of the following options:
•
Standard
—This log filter format logs the date,
time, node, source IP address, user, realm, and
the Secure Access device event ID and
message.
•
WELF
—This customized WebTrends Enhanced
Log Format (WELF) filter combines the
standard WELF format with information about
the Secure Access device realms, roles, and
messages.
•
W3C
—The World Wide Web Consortium’s
extended log file format is a customizable ASCII
format with a variety of different fields. Visit
http://www.w3.org for more information about
this format. Only the User Access log offers this
filter as an option.
•
Custom
—Allows you to enter the format you
want to use.
Specifies the format of the
data in the log.
Format
Type
Enter the format.
NOTE: When entering a format, surround
variables with percentage symbols (for example
%user%
). All other characters are treated as
literals.
Customizes the format of the
data in the log.
NOTE: This box is enabled only
when you select
Custom
from
the Format Type drop-down
list.
Custom
Format
Related
Documentation
Configuring Client-Side Logs (NSM Procedure) on page 310
•
•
Viewing Device Status on page 313
309
Copyright © 2010, Juniper Networks, Inc.
Chapter 23: Configuring Logs in Secure Access Devices
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...