Violation Viewer - Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Configuring Intrusion Detection and Prevention Devices Guide
Table 11: Network Profiler Data (continued)
Column
Description
Dst MAC
Destination MAC addresses of traffic profiled.
Src OUI
Source OUIs of traffic profiled.
NOTE: OUI stands for Organizationally Unique Identifier. This value is a mapping of the first three
bytes of the MAC address and the organization that owns the block of MACs. You can obtain a list of
OUIs at http://standards.ieee.org/regauth/oui/oui.txt.
Dst OUI
Destination OUIs of traffic profiled.
Src OS Name
Operating-system version running on the source IP of the traffic profiled.
Dst OS Name
Operating-system version running on the destination IP of the traffic profiled.
Hits
Number of occurrences that match the traffic profiled.
First Time
Timestamp for the first time the device logged the event (within the specified time interval).
Last Time
Timestamp for the last time the device logged the event (within the specified time interval).
Domain
Domain in which the device is managed in NSM.
Device
Device that profiled the data displayed.

Violation Viewer

24
To display the Network Profiler view:
Navigate to Investigate > Security Monitor > Profiler.
1.
Click the Network Profiler tab.
2.
TIP: For information about using NSM features to sort, filter, and drill down on records,
see the NSM online Help.
The Violation Viewer is a filtered view of the Network Profiler view. In the Violation Viewer,
you configure permitted objects. Permitted objects are filtered from the display, allowing
you to focus on unpermitted traffic.
To configure permitted objects:
Navigate to Investigate > Security Monitor > Profiler.
1.
Click the Violation Viewer tab.
2.
Click on the + icon that appears on the top of the right-hand window to display the
3.
New Permitted Object dialog box.
Type a name for the permitted object.
4.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents