Copyright © 2010, Juniper Networks, Inc.
For more specific information describing each report, refer to the Network and Security
Manager Online Help.
Profiler Reports
Table 113 on page 789 lists and describes those reports in NSM that provide information
about Profiler session logs.
Table 113: Profiler Reports
Report
Description
Top 10 Peers by Count
Ten source and destination IP addresses that appeared most frequently
in the Profiler logs.
Top 10 Peers with
Ten source and destination IP addresses that had highest number of hits
maximum hits
in the Profiler logs.
For more specific information describing each report, refer to the Network and Security
Manager Online Help.
AVT Reports
Table 114 on page 789 lists and describes those reports in NSM that provide information
about application volume tracking.
Table 114: AVT Reports
Report
Description
Top 10 Applications by
Ten applications with highest volume in bytes in the past 24 hours.
Volume
Top 10 Application
Ten application categories with highest volume in bytes in the past 24
Categories by Volume
hours.
Top 5 Applications by
Five applications with highest volume in bytes in the past hour.
Volume over Time (last
1 hour)
Top 5 Application
Five application categories with highest volume in bytes in the past hour.
Categories by Volume
over Time (last 1 hour)
Top 5 Source by Volume
Five source IP addresses with the highest volume in bytes in the past
over Time (last 1 hour)
hour.
Top 5 Destination by
Five destination IP addresses with the highest volume in bytes in the past
Volume over Time (last
hour.
1 hour)
SSL/VPN Reports
Table 115 on page 790 lists and describes those reports in NSM that provide information
about SSL/VPN session logs.
Chapter 19: Reporting
789
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?
Questions and answers