Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 171

Table of Contents

Advertisement

Table 7-8 Flow Search Criteria
Parameter
Description
Saved Searches
Using the drop-down list box, select a previously saved search
you wish to apply to this search, if desired.
Other options include:
Time Range
Choose one of the following options:
Test and Filters
Add Filter Options Using the options, define your specific search criteria including:
For example, if you select Destination IP from the first drop-down
list box, Equals from the second drop-down list box, and enter
10.100.10.100 for the destination IP address you wish to search,
the search results returns results for this criteria.
For each criteria you wish to add to the filter, enter the desired
values and click Add Filter. Repeat for all filters you wish to add
to the search criteria.
Current Filters
Lists current search criteria filters. To remove any listed filter,
select the filter and click Remove Selected Filters.
Search Parameters
Sort/Aggregate
Using the drop-down list box, specify whether you wish to sort
your search results by criteria specified in the By drop-down list
box or view your search results using an Aggregate value.
By
Using the drop-down list box, select additional flow criteria you
wish to use when searching
STRM Users Guide
Delete - Using the drop-down list box, select the search you
wish to delete. Click Delete.
Include in my Quick Searches - Select the check box if you
wish to include this search in your Quick Search items, which
is available in the Search drop-down list box.
Share with Everyone - Select the check box if you wish to
share these search requirements with all other STRM users.
Real Time - Select this option if you wish to filter on flows
while in auto-refresh mode.
Recent - Select the option and, using the drop-down list box,
specify the time range you wish to filter.
Specific Interval - Select the option and, using the calendar,
specify the date and time range you wish to filter.
From the first drop-down list box, select an attribute you wish
to search. For example, Any IP, Source Port, or Protocol.
From the second drop-down list box, select the modifier you
wish to use for the search. The list of modifiers that appear
depends on the attributed selected in the first list.
In the text field, enter specific information related to your
search.
Using the Search
165

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents