Identifying Security Monitoring Devices And Flow Data Sources; Identifying Network Assets; Table 29: Asset Identification - Juniper JSA1500 Hardware Manual

Secure analytics hardware guide
Table of Contents

Advertisement

Juniper Secure Analytics Hardware Guide

Identifying Security Monitoring Devices and Flow Data Sources

Related
Documentation

Identifying Network Assets

114
Identifying Security Monitoring Devices and Flow Data Sources on page 114
Identifying Network Assets on page 114
Juniper Secure Analytics (JSA) can collect and correlate events received from external
sources such as security equipment (for example, firewalls, VPNs, or IDSs) and host or
application security logs, such as Windows logs. Device Support Modules (DSMs) and
Flow Collectors allow you to integrate JSA with this external data. JSA automatically
discovers sensor devices that are sending system log (syslog) messages to an Event
Collector. The sensor devices that are automatically discovered by JSA appear in the
Sensor Devices window within the JSA Administration Console. Once autodiscovery is
completed, you should disable the Auto Detection Enabled option in the Event Collector
configuration. For more information, see the Administration Guide and Log Sources Users
Guide.
JSA Components on page 91
Browser Support on page 92
Preparing the Network Hierarchy on page 93
Identifying Network Settings on page 113
Identifying Network Assets on page 114
Juniper Secure Analytics (JSA) can learn about your network and server infrastructure
based on flow data. The Server Discovery function uses the JSA Asset Profile database
to discover many types of servers.
Defining certain additional server and IP address types also improves tuning results.
Table 27 on page 95
provides a list of possible servers. See the Users Guide for information
on defining servers within JSA. If your network includes a large number of servers, you
can use CIDR or IP subnet addresses within the server networks category.

Table 29: Asset Identification

Server
NAT address range
Vulnerability scanners
Network management
Proxy
IP
Address(es)
QTY
Name
Copyright © 2018, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Jsa3500Jsa3800Jsa5500Jsa5800Jsa7500Jsa7800

Table of Contents