Policy Statistics; Attack Statistics; Ethernet Statistics; Flow Statistics - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide
724
Enable the device to send log entries with the desired severity settings to NSM.
Enable logging in the security policy installed on the device. For details on configuring
traffic logging in your security policy rules, see "Configuring Logging and Alerts" on
page 447.
Traffic log entries appear in the Log Viewer under the Traffic category. For details on
traffic subcategories, see "Traffic Log Entries" on page 927.

Policy Statistics

The device forwards statistics on the policy distribution of the traffic that entered the
device. Policy distribution statistics do not generate log entries; the statistics are used
by the Realtime Monitor module. For details on how policy distribution is displayed in
Realtime Monitor, see "Viewing Traffic Distribution by Security Policy" on page 642.

Attack Statistics

The device forwards statistics for attacks detected in the traffic that entered the device.
Attack statistics do not generate log entries; the statistics are used by the Realtime
Monitor module. For details on how attack statistics are displayed in the Realtime Monitor,
see "Viewing Attack Statistics" on page 651.

Ethernet Statistics

The device forwards statistics for Ethernet activity on the device. Ethernet statistics do
not generate log entries; the statistics are used by the Realtime Monitor module. For
details on how Ethernet statistics are displayed in Realtime Monitor, see "Viewing Ethernet
Statistics" on page 649.

Flow Statistics

The device forwards statistics for flows that entered the device. Flow statistics do not
generate log entries; the statistics are used by the Realtime Monitor . For details on how
flow statistics are displayed in the Realtime Monitor, see "Viewing Flow Statistics" on
page 650.

Protocol Distribution

The device forwards information on the protocol distribution of the traffic that entered
the device. Protocol distribution information does not generate log entries; the information
is used by the Realtime Monitor module. For details on how protocol distribution is
displayed in the Realtime Monitor, see "Viewing Traffic Distribution by Protocol" on
page 644.
The device reports statistics generated by the following services:
AH (Authentication Header)
ESP (Encapsulating Security Payload)
GRE (Generic Routing Encapsulation)
ICMP (Internet Control Message Protocol)
OSPF (Open Shortest Path First)
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents