Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01 Manual page 37

Configuring intrusion detection and prevention devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Table 9: Application Profiler Session
Column
Description
Src IP
Source IP address of the traffic profiled.
Dst IP
Destination IP address of the traffic profiled.
User
The user associated with the traffic profiled.
Role
The role group to which the user that is associated with the traffic profiled belongs.
Context
All contexts of traffic that the devices selected in the Device table recorded.
Value
When you select a context, the values that your devices recorded for a selected context.
Src MAC
Source MAC addresses of traffic profiled.
Dst MAC
Destination MAC addresses of traffic profiled.
Src OUI
Source OUIs of traffic profiled.
NOTE: The Organizationally Unique Identifier (OUI) value is a mapping of the first three bytes of the
MAC address and the organization that owns the block of MACs. You can obtain a list of OUIs at
http://standards.ieee.org/regauth/oui/oui.txt
Dst OUI
Destination OUIs of traffic profiled.
Src OS Name
Operating-system version running on the source IP of the traffic profiled.
Dst OS Name
Operating-system version running on the destination IP of the traffic profiled.
Hits
Number of occurrences that match the traffic profiled.
First Time
Timestamp for the first time the device logged the event (within the specified time interval).
Last Time
Timestamp for the last time the device logged the event (within the specified time interval).
Domain
Domain in which the device is managed in NSM.
Device
Device that profiled the data displayed.
Copyright © 2010, Juniper Networks, Inc.
By default, the Application Profiler view contains only the data collected during the
configured time interval.
To display the Application Profiler view:
Navigate to Investigate > Security Monitor > Profiler.
1.
Click the Application Profiler tab.
2.
Chapter 3: Configuring Profiler Settings
.
21

Advertisement

Table of Contents
loading

Table of Contents