Figure 118: Top Configuration Changes Report; Example: Using Ssl/Vpn Reports To Track Authentication Failures; Example: Using Screen Reports To Identify Attack Trends - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Example: Using SSL/VPN Reports to Track Authentication Failures

Example: Using Screen Reports to Identify Attack Trends

802
In this example, you are a security administrator responsible for tracking users on the
SSL/VPN security devices on your network. You routinely watch for unauthorized users
attempting to access your network by tracking authentication failures. To keep watch
for potential hackers, you can generate a "Top 10 auth failures for user@realm" report
each night.
In this example, you are a security administrator in the network operations center
responsible for tracking potential network attacks. You daily generate and track an
"Attacks By Severity" report.
Over time, you notice that the number of critical attacks has increased 20 percent. To
verify this, you generate an "Attacks over Time" report for the past 30 days.
The report indicates a recent increase in attacks detected by your firewall. You can
generate "Top Attacks", "Top Attackers", and "Top Targets" reports to further investigate
the nature and assess the risk of these attacks.
For details on generating and configuring these reports, refer to the Network and Security
Manager Online Help.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents