Table 53: Device-Specific Views - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 52: Device Statistics Summary (continued)
Item
DC IP
Interface Information
Vsys Information
Last Known Connect Time
Device Status
Last Reboot Time
Last Known Uptime
GMT Time Offset (Hours)
DayLight-Saving
Additional Device Specific Views
From the Device Statistics Summary, you can access additional information enabling
you to view and monitor key traffic, interface, zone, and other system-related information
on a specific security device.
Table 53 on page 657 describes each device-specific view.

Table 53: Device-Specific Views

View Type
View
Traffic
Policy Distribution
Protocol
Distribution
VPN Distribution
Displays
The IP Address of the Device Server (this is not displayed in the Vsys
view).
The employed interfaces. For example: Trust, Untrust, and Self.
The virtual systems associated with this security device (this is not
displayed in the Vsys view).
The last time the security device connected to the Data Collector
(this is not displayed in the Vsys view).
Whether the security device is currently up or down (this is not
displayed in the Vsys view)
The last time the system was restarted (this is not displayed in the
Vsys view).
If the security device is down, the entry lists the last time it was up.
Used to determine how long a security device was down (this is not
displayed in the Vsys view).
The hour the security device is set from Greenwich Mean Time (this
is not displayed in the Vsys view).
Whether you have enabled the security device to adjust time for
daylight savings.
Purpose
View traffic on the security device distributed by policy.
Enables you to view a chart of the traffic distribution by
policy.
View traffic on the security device distributed by
protocol. Enables you to view a chart of the traffic
distribution by protocol.
View the up/down status and active statistics of VPNs
on the security device (if applicable). Also enables you
to view a chart of the VPN distribution by VPN tunnel.
Chapter 17: Realtime Monitoring
657

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents