Table 61: Authenticated Users View; Table 62: Active Sessions Items - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide
656
Table 61 on page 656 describes all information that is available from the Authenticated
Users view:

Table 61: Authenticated Users View

Item
Description
User ID
User login ID.
Source IP Address
Source IP address.
Time
Time that the user logged in.
You can also access VPN information from the Active VPN view, and Active Session
information from the Active Sessions view.
Viewing Active Sessions
You can view a snapshot of ongoing active sessions on the security device. You can view
active sessions from the Active Statistics view.
When you click the Active Sessions tab, a short view of the active sessions displays basic
information (such as source IP, destination IP, translated IP (if applicable), source port,
destination port, translated port (if applicable), policy ID, time the session starts, and
protocol type) about the active sessions on the security device by default. You can also
view extended information about the session, such as session ID, ICMP type (if applicable),
total incoming bytes, total outgoing bytes, total packets count, and how long the session
has been active.
Table 62 on page 656 describes all of the information that is available from the Active
Sessions view:

Table 62: Active Sessions Items

Item
Description
Session ID
A unique identifier specified with the active session.
Source IP
IP address of the sending node of the connection.
Source Port
Port number of the sending node of the connection.
Destination IP
IP address of the receiving node of the connection.
Destination Port
Port number of the receiving node of the connection.
Translated IP
Translated IP address.
Translated Port
Translated port number.
Duration (sec)
Length in seconds of the connection session.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents