Help Center User GuideGetting Started
 
X
User Guide
Getting Started
Contents  

Multi Tenancy

Monitoring Logical System

Purpose

Use the monitoring functionality to view the logical system page.

Action

To monitor logical systems, select Monitor>Logical System.

Meaning

Table 5 summarizes key output fields in the logical system page.

Note All the information displayed in the format n(m) means that n is the used number and m is the reserved number.

Table 5: Logical System Monitoring Page

Field

Value

Additional Information

Name

Displays the logical systems configured on the device.

Resource Profile

Displays the logical system profile assigned to each logical system.

Zone Usage

Displays the used and reserved number of zones that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Scheduler Usage

Displays the number of schedulers that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Policy Count Usage

Displays the number of security policie s with a count that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Policy Without Count Usage

Displays the number of security policies without a count that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Nat Static Rule Usage

Displays the number of NAT static rule configurations that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Nat Source Rule Usage

Displays the NAT source rule configurations that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Nat Source Pool Usage

Displays the NAT source pool configurations that logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Nat Rule Referenced Prefix Usage

Displays the security NAT rule referenced IP prefix quota of a logical system.

Nat Port-Ol IP Number Usage

Displays the number of NAT port overloading IP number configurations that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Nat Pat Portnum Usage

Displays the used quantity and the reserved quantity of ports for the logical system as part of the security profile.

Nat Pat Address Usage

Displays the number of NAT with port address translation (PAT) configurations that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Nat No Pat Address Usage

Displays the number of NAT without port address translation configurations that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Nat Interface Port-Ol IP Usage

Displays the security NAT interface port overloading quota of a logical system.

Nat Destination Rule Usage

Displays the number of NAT destination rule configurations that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Nat Destination Pool Usage

Displays the number of NAT destination pools that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Nat Cone Binding Usage

Displays the number of NAT cone binding configurations that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Flow Session Usage

Displays the number of flow sessions that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Flow Gate Usage

Displays the number of flow gates, also known as pinholes, that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

DsLite Softwire Initiator Usage

Displays the number of IPv6 dual-stack lite (DS-Lite) softwire initiators that can connect to the softwire concentrator configured in either a user logical system or the master logical system.

This statement is configured in the security profile that is bound to the logical system.

CPU on SPU Usage

Displays the CPU utilization and average utilization of all SPUs is shown.

The detail option shows CPU utilization on each SPU.

Auth Entry Usage

Displays the number of firewall authentication entries that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Appfw Rule Set Usage

Displays the number of application firewall rule set configurations that a master administrator has configured for a master logical system or user logical system when the security profile is bound to the logical systems.

Appfw Rule Usage

Displays the number of application firewall rule configurations that a master administrator have configured for a master logical system or user logical system when the security profile is bound to the logical systems.

appfw-profile-count

Displays the application firewall profile quota of a logical system.

As a master administrator, you can create a security profile and specify the kinds and amounts of resources to allocate to a logical system to which the security profile is bound.

address-book-count

Displays the number of address books that user logical system administrators and master logical system administrators have configured for their logical systems if the security profile is bound to the logical systems.

Monitoring Multi Tenancy Tenants

Purpose

Use the monitoring functionality to view the Tenants page.

Action

Procedure

  1. To monitor tenants, select Monitor>Multi Tenancy>Tenants.
  2. Click one:
    • View Details—Displays the grid view or graph view of all the resources for the tenant you have selected.

    • Search icon—Enables you to search for a tenant system in the grid.

    • Filter icon—Enables you to filter and display the list of tenants based on a column in the grid.

    • Show Hide Column icon—Enables you to show or hide a column in the grid.

Meaning

Table 6 summarizes key output fields in the tenants page.

Note All the information displayed in the format n(m) means that n is the used number and m is the reserved number.

Table 6: Tenants Monitoring Page

Field

Value

Additional Information

Name

Displays the tenants configured on the device.

Resource Profile

Displays the resource profile assigned to each tenant.

Zone Usage

Displays the used and reserved number of zones for the given tenant.

Scheduler Usage

Displays the number of schedulers that master administrators have configured for their tenants.

Policy Count Usage

Displays the number of security policies with a count master administrators have configured for their tenants if the security profile is bound to the tenants.

Policy Without Count Usage

Displays the number of security policies without a count that master administrators have configured for their tenants if the security profile is bound to the tenants.

Nat Static Rule Usage

Displays the number of NAT static rule configurations that master administrators have configured for their tenants if the security profile is bound to the tenants.

Nat Source Rule Usage

Displays the NAT source rule configurations that master administrators have configured for their tenants if the security profile is bound to the tenants.

Nat Source Pool Usage

Displays the NAT source pool configurations that master administrators have configured for their tenants if the security profile is bound to the tenants.

Nat Rule Referenced Prefix Usage

Displays the security NAT rule referenced IP prefix quota of a tenant.

Nat Port-Ol IP Number Usage

Displays the number of NAT port overloading IP number configurations that master administrators have configured for their tenants if the security profile is bound to the tenants.

Nat Pat Portnum Usage

Displays the used quantity and the reserved quantity of ports for the tenant as part of the security profile.

Nat Pat Address Usage

Displays the number of NAT with port address translation (PAT) configurations that master administrators have configured for their tenants if the security profile is bound to the tenants.

Nat No Pat Address Usage

Displays the number of NAT without port address translation configurations that master administrators have configured for their tenants if the security profile is bound to the tenants.

Nat Interface Port-Ol IP Usage

Displays the security NAT interface port overloading quota of a tenant.

Nat Destination Rule Usage

Displays the number of NAT destination rule configurations thatmaster administrators have configured for their tenants if the security profile is bound to the tenants.

Nat Destination Pool Usage

Displays the number of NAT destination pools that master administrators have configured for their tenants if the security profile is bound to the tenants.

Nat Cone Binding Usage

Displays the number of NAT cone binding configurations that master administrators have configured for their tenants if the security profile is bound to the tenants.

Flow Session Usage

Displays the number of flow sessions that master administrators have configured for their tenants if the security profile is bound to the tenants.

Flow Gate Usage

Displays the number of flow gates, also known as pinholes, that master administrators have configured for their tenants if the security profile is bound to the tenants.

DsLite Softwire Initiator Usage

Displays the number of IPv6 dual-stack lite (DS-Lite) softwire initiators that can connect to the softwire concentrator configured in either a user tenant or the master tenant.

This statement is configured in the security profile that is bound to the tenant.

CPU on SPU Usage

Displays the CPU utilization and average utilization of all SPUs.

The detail option shows CPU utilization on each SPU.

Auth Entry Usage

Displays the number of firewall authentication entries that master administrators have configured for their tenants if the security profile is bound to the tenants.

Appfw Rule Set Usage

Displays the number of application firewall rule set configurations that a master administrator has configured for a tenant when the security profile is bound to the tenants.

Appfw Rule Usage

Displays the number of application firewall rule configurations that a master administrator have configured for a master tenant or user tenant when the security profile is bound to the tenants.

appfw-profile-count

Displays the application firewall profile quota of a tenant.

As a master administrator, you can create a security profile and specify the kinds and amounts of resources to allocate to a tenant to which the security profile is bound.

address-book-count

Displays the number of address books that master administrators have configured for their tenants if the security profile is bound to the tenants.

Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit