Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Log Source Mapping in JSA

SUMMARY To monitor the trigger frequency of firewall rules and enable topology event searches, JSA Risk Manager identifies JSA log sources.

By understanding firewall rules, you can maintain firewall efficiency and prevent security risks.

A maximum of 255 devices can be mapped to a log source in JSA Risk Manager, but devices can have multiple log sources.

Log Source Mapping Display Options

If you configured your network device as a JSA log source, the Configuration Monitor page displays one of the following entries in the Log Source column:

  • Auto-Mapped - If JSA Risk Manager identifies and maps the log source to the device automatically.
  • Username - If an administrator manually added or edited a log source.
  • Blank - If JSA Risk Manager is unable to identify a log source for the device, the Log Source column shows no value. You can manually create a log source mapping.

For more information about configuring log sources, see the Juniper Secure Analytics Configuring DSMs Guide.