Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 169

Table of Contents

Advertisement

Table 7-7 Application (continued)
Parameter
Description
Source IP
Specifies the number of source IP addresses associated with this
flow.
Source Network
Specifies the source network of the flow. If there are multiple
source networks associated with this event, this field indicates
Multiple and the number.
Destination IP
Specifies the destination IP address of the flow. If there are
destination IP addresses associated with this event, this field
indicates Multiple and the number.
Destination Port
Specifies the destination port of the flow. If there are multiple
destination ports associated with this event, this field indicates
Multiple and the number.
Destination
Specifies the destination network of the flow. If there are multiple
Network
networks associated with this event, this field indicates Multiple
and the number.
Protocol
Specifies the protocol associated with this flow.
Note: This parameter only applies to the Flow Direction, Source
Network/ Destination Network, Protocol, Source IP to Destination
IP, Source ASN/ Destination ASN, Destination Port/ Protocol,
Destination Port/ Application, Application/ Source IF Index/
Destination IF Index, Destination Port/ Source IF Index/
Destination IF Index, Source IF Index, and Destination IF Index
options.
Source Bytes
Specifies the number of bytes from the source.
Destination Bytes
Specifies the number of bytes from the destination.
Source Packets
Specifies the number of packets from the source.
Destination
Specifies the number of packets from the destination.
Packets
Total Bytes
Specifies the total number of bytes associated with the flow.
Total Packets
Specifies the total number of packets associated with the flow.
Host Count
Specifies the number of hosts the IP address has communicated
with.
Count
Specifies the number of flows the IP address has sent or
received.
STRM Users Guide
Viewing Flows
163

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents