Viewing Profiler Logs (Nsm Procedure); Application Profiler - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01 Manual

Configuring intrusion detection and prevention devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Intrusion Detection and Prevention Devices Guide
Related
Documentation

Viewing Profiler Logs (NSM Procedure)

Application Profiler

20
NOTE: If you change Profiler settings, you must push a configuration update
to the device before the new settings take effect. From the Device Manager,
right-click the device, select Update Device, select the Restart IDP Profiler
After Device Update checkbox, and click OK.
Configuring Profiler Database Preferences (NSM Procedure) on page 26
Querying the Profiler Database (NSM Procedure) on page 28
Purging the Profiler Database (NSM Procedure) on page 28
Viewing Profiler Logs (NSM Procedure) on page 20
The Profiler Viewer contains multiple tabs with different views of Profiler data. The
following topics describe these views:
Application Profiler on page 20
Protocol Profiler on page 22
Network Profiler on page 23
Violation Viewer on page 25
The Application Profiler tab displays Application Volume Tracking (AVT) data. The
Application Profiler tab is a table of information such as the NSM Log Viewer which
enables you to view and analyze dynamic application (Layer-7) traffic within a specific
context.
The Application Profiler view is divided into two sections:
In the left pane, the Application Profiler tab displays a hierarchical tree of application
categories. Applications are grouped by common functionality. For example,
Peer-to-Peer applications include Chat and File Sharing applications. Under Chat, you
can display Yahoo messenger, MSN, and AIM; under File Sharing, you can display Kazaa,
Bittorrent, and Gnutella.
The left pane also displays aggregate statistics for volume (bytes) and packet count
for the application category, application group, or application you select in the tree.
In the right pane, the Application Profiler tab displays tables of session logs related to
the application category or application you select in the left pane.
Table 9 on page 21 describes Application Profiler session table.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

Table of Contents