Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual page 31

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Table 6: Profiler Settings: General Tab
Setting
Enable Profiling
Enable Application
Profiling
Enable Application
Volume Tracking
Include Probe and
Attempt
Include Non-tracked IP
Profiles
db limit (in MB)
Enable OS fingerprinting
Refresh Interval(in secs)
Copyright © 2010, Juniper Networks, Inc.
To specify Profiler general options:
From Device Manager, double-click a device and then click Profiler Settings.
1.
Click the General tab.
2.
Configure Profiler general options using Table 6 on page 15.
3.
Click Apply.
4.
Description
Enables the Profiler.
Enables the Profiler to collect and track application data.
This setting can be started when you disable it in the profiler setting.
Enables the Profiler to perform application volume tracking.
Enables the Profiler to collect and track specific probes and attempts.
Enables the Profiler to collect and track data from external hosts.
Specifies maximum database size for the Profiler on each device. By default, the maximum database
size is set to 3GB.
Enables the Profiler to perform passive OS fingerprinting to determine the operating system of an
end host.
OS fingerprinting detects the operating system of an end host by analyzing TCP handshake packets.
The OS fingerprinting process depends on an established TCP connection (one that has a SYN and
a SYN/ACK).
The OS fingerprinting process is capable of detecting the operating systems listed in
/usr/idp/device/cfg/fingerprints.set.
Specifies the time interval (in seconds) that the Profiler refreshes OS fingerprinting. By default, the
Profiler refreshes OS fingerprinting data every 3600 seconds (60 minutes).
NOTE: If you change Profiler settings, you must push a configuration update to the
device before the new settings take effect. From the Device Manager, right-click the
device, select Update Device, select the Restart IDP Profiler After Device Update
checkbox, and click OK.
Chapter 3: Configuring Profiler Settings
15

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents