Summary:
- Date and time that the connection started
- Source address and port number
- Translated source address and port number
- Destination address and port number
- The duration of the session
- The service used in the session
To log all traffic that a Juniper firewall device receives, you must enable the logging option for all policies.
To log specific traffic, enable logging only on policies that apply to that traffic.
The
firewall generates logs when sessions end. However beginning with
ScreenOS 5.2.0 and above, you also have the option to start logging at
session initiation. Logging at session init will not show duration but
it can be useful for troubleshooting purposes.
- Through the WebU or CLI; see Step 7 below
- Through email alert notification. For information on email alert notification, go to Configuring Email Alert Notifications.
- Through Syslog. For more information on configuring Syslog, go to Configuring Syslog
To configure the Juniper Firewall Traffic Log, perform the following steps:
Open the WebUI. For assistance, see KB4060 - Accessing Your NetScreen, SSG, or ISG Firewall Using the WebUI.
From the ScreenOS options menu, click Policies.
Click New or Edit.
Click to select Logging.
By checking the first box, the security device generates logs when sessions end. By checking the 'at Session Beginning', the security device generate logs when sessions start. If both are selected, you will get both entries.
Click OK.
You can view traffic logs stored in flash storage on the Juniper firewall device through either the CLI or WebUI. You may also open or save the file to the location you specify, and then use an ASCII text editor (such as Notepad or WordPad) to view the file. Alternatively, you can send them to an external storage space, or include traffic logs with event logs sent by email to an administrator. To view the traffic logs through the WebUI, perform the following:
To view the Traffic Logs from the ScreenOS options menu, click Reports, and then select Policies. To view the Traffic Logs from the CLI, enter the command get log traffic <options>
.