Configuring Profiler Settings; Configuring Profiler Options (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

CHAPTER 3

Configuring Profiler Settings

Configuring Profiler Options (NSM Procedure)

Copyright © 2010, Juniper Networks, Inc.
Before configuring security, you must first enable and set up the Profiler. The Profiler is
a network analysis tool that helps you learn about your internal network, enabling you
to create effective security policies and minimize unnecessary log records. After you
configure the Profiler, it automatically learns about your internal network and the elements
that comprise it, including hosts, peers (communication between two hosts), ports
(non-IP protocols, TCP/UDP ports, RPC programs), and Layer-7 data that uniquely
identifies hosts, applications, commands, users, and filenames.
The Profiler is supported in all IDP modes and HA configurations, and also queries and
correlates information from multiple devices. For details on analyzing your network, see
the Network and Security Manager Administration Guide. This chapter provides information
on setting up the Profiler and configuring antivirus settings, including antispam and Web
filtering.
Profiler option settings are valid for standalone IDP sensors only. For more information,
see the NSM online Help.
To configure the Profiler on a given IDP sensor, open the Device window and select Profiler
Settings.
You configure Profiler options to enable Profiler features, set network addresses and
applications subject to profiling, and set alerts.
Setting Up the Profiler
Using the Profiler involves the following steps:
13

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents