Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual page 37

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Table 9: Application Profiler Session (continued)
Column
Description
Context
All contexts of traffic that the devices selected in the Device table recorded.
Value
When you select a context, the values that your devices recorded for a selected context.
Src MAC
Source MAC addresses of traffic profiled.
Dst MAC
Destination MAC addresses of traffic profiled.
Src OUI
Source OUIs of traffic profiled.
NOTE: The Organizationally Unique Identifier (OUI) value is a mapping of the first three bytes of the
MAC address and the organization that owns the block of MACs. You can obtain a list of OUIs at
http://standards.ieee.org/regauth/oui/oui.txt
Dst OUI
Destination OUIs of traffic profiled.
Src OS Name
Operating-system version running on the source IP of the traffic profiled.
Dst OS Name
Operating-system version running on the destination IP of the traffic profiled.
Hits
Number of occurrences that match the traffic profiled.
First Time
Timestamp for the first time the device logged the event (within the specified time interval).
Last Time
Timestamp for the last time the device logged the event (within the specified time interval).
Domain
Domain in which the device is managed in NSM.
Device
Device that profiled the data displayed.
Copyright © 2010, Juniper Networks, Inc.
By default, the Application Profiler view contains only the data collected during the
configured time interval.
To display the Application Profiler view:
Navigate to Investigate > Security Monitor > Profiler.
1.
Click the Application Profiler tab.
2.
TIP: You can jump from the Application Profiler tab to the APE rulebase editor by
right-clicking an application in the left pane and selecting a policy editor option. For
information about using NSM features to sort, filter, and drill down on records, see the
NSM online help.
Chapter 3: Configuring Profiler Settings
.
21

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents