Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01 Manual page 40

Configuring intrusion detection and prevention devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Intrusion Detection and Prevention Devices Guide
Table 11: Network Profiler Data (continued)
Column
Description
Access Type
Type of the traffic profiled:
Src MAC
Source MAC addresses of traffic profiled.
Dst MAC
Destination MAC addresses of traffic profiled.
Src OUI
Source OUIs of traffic profiled.
NOTE: OUI stands for Organizationally Unique Identifier. This value is a mapping of the first three
bytes of the MAC address and the organization that owns the block of MACs. You can obtain a list of
OUIs at http://standards.ieee.org/regauth/oui/oui.txt.
Dst OUI
Destination OUIs of traffic profiled.
Src OS Name
Operating-system version running on the source IP of the traffic profiled.
Dst OS Name
Operating-system version running on the destination IP of the traffic profiled.
Hits
Number of occurrences that match the traffic profiled.
First Time
Timestamp for the first time the device logged the event (within the specified time interval).
Last Time
Timestamp for the last time the device logged the event (within the specified time interval).
Domain
Domain in which the device is managed in NSM.
Device
Device that profiled the data displayed.
24
Access indicates a successful connection, during which the device recorded valid requests and
responses from the server to a client.
Attempt indicates a request that did not receive a reply. The device recorded a packet from a client
to a server, but never saw a reply.
Probe indicates a request that does not expect a reply. For non-TCP sessions, the device recorded
an ICMP error; for TCP sessions, the device recorded a SYN packet from the client followed by a
RST from the server.
To display the Network Profiler view:
Navigate to Investigate > Security Monitor > Profiler.
1.
Click the Network Profiler tab.
2.
TIP: For information about using NSM features to sort, filter, and drill down
on records, see the NSM online Help.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

Table of Contents