Viewing Profiler Logs (Nsm Procedure); Application Profiler - Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Configuring Intrusion Detection and Prevention Devices Guide
Related Topics

Viewing Profiler Logs (NSM Procedure)

Application Profiler

Table 9: Application Profiler Session
Column
Description
Src IP
Source IP address of the traffic profiled.
Dst IP
Destination IP address of the traffic profiled.
User
The user associated with the traffic profiled.
Role
The role group to which the user that is associated with the traffic profiled belongs.
20
Configuring Profiler Database Preferences (NSM Procedure) on page 26
Querying the Profiler Database (NSM Procedure) on page 28
Purging the Profiler Database (NSM Procedure) on page 28
Viewing Profiler Logs (NSM Procedure) on page 20
The Profiler Viewer contains multiple tabs with different views of Profiler data. The
following topics describe these views:
Application Profiler on page 20
Protocol Profiler on page 22
Network Profiler on page 23
Violation Viewer on page 24
The Application Profiler tab displays Application Volume Tracking (AVT) data. The
Application Profiler tab is a table of information such as the NSM Log Viewer which
enables you to view and analyze dynamic application (Layer-7) traffic within a specific
context.
The Application Profiler view is divided into two sections:
In the left pane, the Application Profiler tab displays a hierarchical tree of application
categories. Applications are grouped by common functionality. For example,
Peer-to-Peer applications include Chat and File Sharing applications. Under Chat, you
can display Yahoo messenger, MSN, and AIM; under File Sharing, you can display Kazaa,
Bittorrent, and Gnutella.
The left pane also displays aggregate statistics for volume (bytes) and packet count
for the application category, application group, or application you select in the tree.
In the right pane, the Application Profiler tab displays tables of session logs related to
the application category or application you select in the left pane.
Table 9 on page 20 describes Application Profiler session table.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents