Table 109: Di/Idp Reports - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide
786
Table 108: Firewall and VPN Reports (continued)
Report
Description
Top Information Logs
The total number of information log entries generated by the managed
security devices in your network, within filter constraints
Top Self Logs
The total number of Self log entries generated by the managed security
devices in your network, within filter constraints
DI/IDP Reports
Table 109 on page 786 lists and describes reports in NSM that provide DI and IDP
information.

Table 109: DI/IDP Reports

Report
Top 100 Attacks (last 24 hours)
Top 100 Attacks Prevented (last 24 hours)
Top 20 Attackers (All Attacks - last 24
hours)
Top 20 Attackers Prevented (All Attacks
- last 24 hours)
Top 20 Targets (last 24 hours)
Top 20 Targets Prevented (last 24 hours)
All Attacks by Severity (last 24 hours)
All Attacks Prevented by Severity (last 24
hours)
All Attacks Over Time (last 7 days)
All Attacks Prevented Over Time (last 7
days)
All Attacks Over Time (last 30 days)
All Attacks Prevented Over Time (last 30
days)
Description
Those attacks that are detected most frequently
within the last 24 hours.
Those attacks that are prevented most frequently
within the last 24 hours.
20 IP addresses that have most frequently been the
source of an attack during the last 24 hours.
20 IP addresses that have most frequently been
prevented from attacking the network during the last
24 hours.
20 IP addresses that have most frequently been the
target of an attack during the last 24 hours.
20 IP addresses that have most frequently prevented
attacks during the last 24 hours.
Number of attacks by severity level (set in attack
objects).
Number of attacks by severity level (set in attack
objects).
All attacks detected during the last 7 days.
All attacks prevented during the last 7 days.
All attacks detected during the last 30 days.
All attacks prevented during the last 30 days.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents