Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 44

Table of Contents

Advertisement

38
M
Y
N
ANAGING
OUR
A
ETWORK
CTIVITY
The results appear. For more information on interpreting results, see
Using the Flow
To search for a single IP address, click Search.
b
The Flow Search window appears. For more information, see
the Flow
Viewer.
Note: If you have upgraded your system to STRM 6.1 and you attempt to search
for flows recorded before the upgrade, the pre-STRM 6.1 View Flows search
interface appears. For more information regarding this interface, see the STRM
Users Guide, STRM 6.0.
Viewer.
STRM Users Guide
Chapter 7
Chapter 7 Using

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents