Configuring Logging

To configure logging for the Threat Mitigation Application:

  • Edit or accept the default values for the fields in the Loggers tab. Image s011025.gif

For more information about logging, see the SRC-PE Monitoring and Troubleshooting Guide.


Copyright © 2008, Juniper Networks, Inc. All rights reservedTrademark Notice.