Table 58: Ethernet Statistics View Data - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 57: Active VPN Table (continued)
Item
Description
Lifetime P2
Time reported in remaining bytes before re-keying. Independent from
Lifetime P1.
Life Size
Predefined duration of the tunnel (in bytes).
P1 Status
P1 (phase 1) status for tunnel negotiation: enabled or disabled.
P2 Status
P2 (phase 2) status for tunnel negotiation: enabled or disabled.
P1 Auth
Associated with Auto IKE. This column displays the P1 (phase 1)
authentication for the active VPN.
Viewing Interface Statistics
You can view traffic information as it is processed by a device on a specific interface:
Viewing Ethernet Statistics on page 675
Viewing Flow Statistics on page 676
Viewing Attack Statistics on page 677
Viewing Ethernet Statistics
Click the Ethernet Statistics node to view traffic information as it is processed by a
specific physical interface on a security device. Depending upon the specific security
device, the following interfaces apply:
Trust and Untrust interfaces available on all security devices.
DMZ interface available on NetScreen-25, NetScreen-50 and NetScreen-500 devices;
the NetScreen-5XP device has no DMZ interface.
HA interface and management interface available on NetScreen-500 devices.
Ethernet Statistics apply only to security devices, and not to virtual systems.
A graph displays security device percentage utilization traffic on the interface. Right-click
within the chart to select a desired interface (such as Ethernet or HA). The active interface
is listed below the graph. The graph also provides the total errors. You can view up to 12
samples in the chart. Table 58 on page 675 describes the information available from the
Ethernet Statistics view:

Table 58: Ethernet Statistics View Data

Item
Description
Interface
The data for each interface.
Bytes In
The number of bytes of incoming traffic processed through the security
device over the selected interface.
Chapter 17: Realtime Monitoring
675

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents