Specifying Context Targets - Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Table 7: Profiler Tracked Hosts/Exclude List Dialog Boxes (continued)
Setting
Add Network
Add Group

Specifying Context Targets

Copyright © 2010, Juniper Networks, Inc.
Description
Name—Enter the name of the host.
IP Address—Enter the IP address of the network.
Use Wildcard Mask—Enable this feature if you want to use wildcard mask.
Netmask—Enter the netmask for the IP.
Color—Select any color from the drop-down list.
Comment—Enter any additional comments.
Name—Enter the name of the group.
Color—Select any color from the drop-down list.
Comment—Enter any additional comments.
Member List—Add or remove the members from the non-members list.
Click the Exclude List tab.
5.
Click the + icon and then select Add Host > Add Network or Add Group. A dialog
6.
box appears where you create your exclude list.
Table 7 on page 16 describes these dialog box settings.
Configure Profiler settings using Table 7 on page 16.
7.
Click Apply.
8.
NOTE: If you change Profiler settings, you must push a configuration update to the
device before the new settings take effect. From the Device Manager, right-click the
device, select Update Device, select the Restart IDP Profiler After Device Update check
box, and click OK.
Select the contexts you want to profile in the Context Targets tab. Next, determine which
contexts you want the device to record. In the Contexts to Profile tab, the context list
includes only the contexts that can clearly identify a host, a user, and/or an application.
When you start the Profiler, the device begins collecting data on traffic that matches the
selected contexts. For example, To track FTP logins, usernames, and commands, select
the FTP contexts in the Contexts to Profile tab. After the Profiler is started, the device
begins collecting information about FTP logins, usernames, and commands, enabling
you to quickly identify the users using FTP on your network and the actions they perform
over that protocol.
Chapter 3: Configuring Profiler Settings
17

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents