Network Profiler - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01 Manual

Configuring intrusion detection and prevention devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Table 10: Protocol Profiler Data (continued)
Column
Hits
First Time
Last Time
Domain
Device

Network Profiler

Table 11: Network Profiler Data
Column
Description
Src IP
Source IP address of the traffic profiled.
Dst IP
Destination IP address of the traffic profiled.
User
The user associated with the traffic profiled.
Role
The role group to which the user that is associated with the traffic profiled belongs.
Service
All services of traffic profiled.
Copyright © 2010, Juniper Networks, Inc.
Description
Number of occurrences that match the session.
Timestamp for the first time the device logged the event (within the specified time interval).
Timestamp for the last time the device logged the event (within the specified time interval).
NSM domain.
Device through which the session was forwarded.
By default, the Protocol Profiler tab contains only the data collected during the configured
time interval.
To display the Protocol Profiler tab:
In the NSM navigation tree, select Investigate > Security Monitor > Profiler.
1.
Click the Protocol Profiler tab.
2.
TIP: For information about using NSM features to sort, filter, and drill down
in records, see the NSM online Help.
The Network Profiler view is a table of information such as the NSM Log Viewer which
enables you to view and analyze data related to static traffic (Layer-3, Layer-4, and RPC
protocols, ports, and program numbers) within the context of data corresponding to
peer, host, and operating system.
Table 11 on page 23 describes Network Profiler data.
Chapter 3: Configuring Profiler Settings
23

Advertisement

Table of Contents
loading

Table of Contents