10.02.2013 Views

Juniper Networks Secure Access Administration Guide

Juniper Networks Secure Access Administration Guide

Juniper Networks Secure Access Administration Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table of Contents<br />

Chapter 24 System archiving 627<br />

Licensing: System archiving availability .......................................................627<br />

Archiving IVE binary configuration files .......................................................628<br />

Creating local backups of IVE configuration files ..........................................630<br />

Importing and exporting IVE configuration files...........................................632<br />

Exporting a system configuration file ....................................................632<br />

Importing a system configuration file ....................................................633<br />

Exporting local user accounts or resource policies.................................634<br />

Importing local user accounts or resource policies.................................635<br />

Importing and exporting XML configuration files .........................................635<br />

Creating and modifying XML instances .................................................637<br />

Referential integrity constraints.............................................................641<br />

Mapping the XML instance to UI components .......................................642<br />

XML import modes................................................................................643<br />

Downloading the schema file ................................................................645<br />

Strategies for working with XML instances ............................................646<br />

XML Import/Export use cases ................................................................650<br />

Importing to a system with the Management Port.................................656<br />

Pushing configurations from one IVE to another..........................................656<br />

Defining the target IVEs.........................................................................657<br />

Pushing the configuration settings.........................................................658<br />

Chapter 25 Logging and monitoring 663<br />

Licensing: Logging and monitoring availability.............................................663<br />

Logging and Monitoring overview ................................................................664<br />

Log file severity levels............................................................................665<br />

Custom filter log files.............................................................................666<br />

Dynamic log filters ................................................................................666<br />

Viewing and deleting user sessions........................................................666<br />

Configuring the Log Monitoring features ......................................................668<br />

Configuring events, user access, admin access, IDP sensor, and NC packet logs<br />

668<br />

Creating, resetting, or saving a dynamic log query ................................669<br />

Specifying which events to save in the log file .......................................670<br />

Creating, editing, or deleting log filters ..................................................672<br />

Creating custom filters and formats for your log files ............................672<br />

Monitoring the IVE as an SNMP agent..........................................................673<br />

Viewing system statistics .............................................................................679<br />

Enabling client-side logs...............................................................................679<br />

Enabling client-side logging and global options......................................680<br />

Enabling client-side log uploads.............................................................681<br />

Viewing uploaded client-side logs ..........................................................682<br />

Viewing general status .................................................................................683<br />

Viewing system capacity utilization .......................................................683<br />

Specifying time range and data to display in graphs..............................684<br />

Configuring graph appearance...............................................................684<br />

Viewing critical system events...............................................................685<br />

Downloading the current service package .............................................685<br />

Editing the system date and time ..........................................................685<br />

Monitoring active users................................................................................686<br />

Viewing and cancelling scheduled meetings.................................................687<br />

Table of Contents � xvii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!