Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 692

Table of Contents

Advertisement

Network and Security Manager Administration Guide
642
Table 51: Device-Specific Views (continued)
View Type
View
Interface
Ethernet Statistics
Flow Statistics
Attack Statistics
Zone
Ethernet Statistics
Flow Statistics
Attack Statistics
System
Resource Statistics
Active Statistics
HA
NSRP Statistics
Viewing Device Traffic Distribution
You can view statistics describing how the traffic on a specific security device is distributed,
by policy, protocol, or VPNs (if applicable). You can use this information to help you
identify those policies, protocols, and VPN tunnels that are most and least frequently
used on a security device.
Viewing Traffic Distribution by Security Policy
Click Policy Distribution to view security device traffic that matches the access policies
configured for a security device. A bar graph appears (under the Chart tab) depicting the
distribution of data by policy. The graph displays a percentage of the absolute number
of bytes for the top 10 policies by default.
Table 52 on page 643 describes all of the information that is available from the Policy
Distribution view.
Purpose
View security device traffic over specific interfaces.
Enables you to view a chart of the utilization distributed
by interface.
View security device traffic on flow counters over
specific interfaces. Enables you to view a chart of flow
statistics distributed by interface.
View all of the attacks that have occurred on a security
device over specific interfaces. Enables you to view a
chart of attacks distributed by interface.
View security device traffic from specific zones. Enables
you to view a chart of the traffic distributed by zone.
View security device traffic on flow related statistics for
specific interfaces. Enables you to view a chart of flow
statistics distributed by zone.
View all counters related to attacks that have occurred
on a security device from specific zones. Enables you to
view a chart of the attacks distributed by zone.
View CPU utilization and memory allocation statistics
on the security device. Enables you to view CPU,
Memory, and Session Utilization trends.
View administrator and user activities; active VPNs; and
authenticated users on a security device. Also enables
you to view a snapshot of the ongoing active sessions
on the security device.
View NSRP statistics related to clusters created on the
security device (if applicable).
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents