To configure logging for the Threat Mitigation Application:
For more information about logging, see the SRC-PE Monitoring and Troubleshooting Guide.
Copyright © 2008, Juniper Networks, Inc. All rights reserved. Trademark Notice.