Table 83: Protocol Profiler Data; About The Protocol Profiler - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

About the Protocol Profiler

Table 83: Protocol Profiler Data

Column
Description
Src IP
Source IP address of the traffic profiled.
Dst IP
Destination IP address of the traffic profiled.
User
The user associated with the traffic profiled.
Role
The role group to which the user that is associated with the traffic profiled
belongs.
Context
All contexts of traffic that the devices selected in the Device table recorded.
Value
When you select a context, the values that your devices recorded for a
selected context.
Src MAC
Source MAC addresses of traffic profiled.
Dst MAC
Destination MAC addresses of traffic profiled.
Src OUI
Source OUIs of traffic profiled.
NOTE: OUI stands for Organizationally Unique Identifier. This value is a
mapping of the first three bytes of the MAC address and the organization
that owns the block of MACs. You can obtain a list of OUIs at
http://standards.ieee.org/regauth/oui/oui.txt
Dst OUI
Destination OUIs of traffic profiled.
Src OS Name
Operating-system version running on the source IP of the traffic profiled.
Dst OS Name
Operating-system version running on the destination IP of the traffic profiled.
Hits
Number of occurrences that match the traffic profiled.
First Time
Timestamp for the first time the device logged the event (within the specified
time interval).
Last Time
Timestamp for the last time the device logged the event (within the specified
time interval).
Copyright © 2010, Juniper Networks, Inc.
The Protocol Profiler view is a table of information that, like the Log Viewer, enables you
to view and analyze dynamic application (Layer-7) traffic within a specific context. By
default, this view contains only the data collected during the configured time interval;
additionally, if you select a specific device, the Profiler displays only the information
gathered by that device.
Table 83 on page 691 lists and describes the information that you can view using the
Protocol Profiler:
Chapter 17: Analyzing Your Network
.
691

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents