Creating Nsm Custom Reports - Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Table 62: NSM Profiler Predefined Reports (continued)
Report
Top 10 Peers with maximum hits
Table 63: NSM: Application Volume Tracking Reports
Report
Top 10 Applications by Volume
Top 10 Application Categories by
Volume
Top 5 Applications by Volume over
Time (last 1 hour)
Top 5 Application Categories by
Volume (last 1 hour)
Top 5 Source by Volume over Time
(last 1 hour)
Top 5 Destination by Volume over
Time (last 1 hour)
Related Topics

Creating NSM Custom Reports

Purpose
Action
Copyright © 2010, Juniper Networks, Inc.
Description
Ten source and destination IP addresses that had the highest number of hits in
the Profiler logs.
Table 63 on page 135 describes the predefined application volume tracking reports. The
reports are related to application use in your network.
Description
Applications with the highest volume in bytes in the past 24 hours.
Application categories with the highest volume in bytes in the past 24 hours.
Applications with the highest volume in bytes in the past 1 hour.
Application categories with the highest volume in bytes in the past 1 hour.
Source IP addresses with the highest volume in bytes in the past 1 hour.
Destination IP addresses with the highest volume in bytes in the past 1 hour.
Creating NSM Custom Reports on page 135
NSM Logs and Reports Overview on page 127
You use custom reports if you require a view of data not covered by predefined reports.
To create a custom report:
In the NSM navigation tree, select Investigate > Report Manager.
1.
Select a pre-defined report with data similar to what you ultimately want to save.
2.
Select File > Save As.
3.
Use pre-defined report as a template and example, complete the configuration
4.
options, and click OK to save the new report settings.
Table 64 on page 136 describes configuration options.
Chapter 12: Working with NSM Logs and Reports
135

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents