Table 84: Network Profiler Data; About The Network Profiler - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide
Table 83: Protocol Profiler Data (continued)
Column
Description
Domain
Domain in which the device is managed in NSM.
Device
Device that profiled the data displayed.

About the Network Profiler

Table 84: Network Profiler Data

Column
Description
Src IP
Source IP address of the traffic profiled.
Dst IP
Destination IP address of the traffic profiled.
User
The user associated with the traffic profiled.
Role
The role group to which the user that is associated with the traffic profiled
belongs.
Service
All services of traffic profiled.
Access Type
Type of the traffic profiled:
Access indicates a successful connection, during which the device recorded
valid requests and responses from the server to a client.
Attempt indicates a request that did not receive a reply. The device recorded
a packet from a client to a server, but never saw a reply.
Probe indicates a request that does not expect a reply. For non-TCP sessions,
the device recorded an ICMP error; for TCP sessions, the device recorded a
SYN packet from the client followed by a RST from the server.
Src MAC
Source MAC addresses of traffic profiled.
Dst MAC
Destination MAC addresses of traffic profiled.
Src OUI
Source OUIs of traffic profiled.
NOTE: OUI stands for Organizationally Unique Identifier. This value is a
mapping of the first three bytes of the MAC address and the organization
that owns the block of MACs. You can obtain a list of OUIs at
http://standards.ieee.org/regauth/oui/oui.txt
692
The Network Profiler view is a table of information that, like the Log Viewer, enables you
to view and analyze data related to static traffic (Layer-3, Layer-4, and RPC protocols,
ports, and program numbers) within the context of data corresponding to peer, host, and
operating system.
Table 84 on page 692 lists and describes the information that you can view from the
Network Profiler:
.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents