Table 59: Flow Statistics View Data - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
To change the interface setting, right-click in the chart and select the interface that you
want. Table 59 on page 677 describes all the information that is available from the Flow
Statistics view:

Table 59: Flow Statistics View Data

Item
Description
Interface
The name of the virtual interface.
Bytes In
The number of bytes of incoming traffic processed through the security
device over the selected interface.
Bytes Out
The number of bytes of outgoing traffic processed through the security
device over the selected interface.
Packets In
The number of incoming packets processed through the security device
over the selected interface.
Packets Out
The number of outgoing packets processed through the security device
over the selected interface.
VLAN In
The number of VLAN packets received through the security device; applies
to virtual systems.
VLAN Out
The number of VLAN packets sent through the security device; applies to
virtual systems.
Connections
The number of connections that occurred for a given interface.
Packets Dropped
The number of incoming packets dropped by a given interface.
Packets Denied
The number of incoming packets denied on the virtual interface by the
policy.
Authentication
The number of packets dropped because of an authentication failure.
Failed
URL Blocking
The number of packets dropped because of URL blocking.
Dropped
IPSec Dropped
The number of IPSec packets dropped.
Zone
The name of the zone associated with the interface.
Viewing Attack Statistics
Click the Attack Statistics node to view distribution of the attacks that have occurred
on a specific security device. The report separates the data and statistics for all available
interfaces. Table 60 on page 678 describes each of the attack counters available from
the Attack Statistics view:
Chapter 17: Realtime Monitoring
677

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents