•
Context—Plain text describing one protocol attribute, for example, 'SSL server version'
•
Value—Value specific for a context, for example, for 'SSL server version' the value '3.1'
Graph Types
Depending on the starting reference point, the following graphs appear in Security Explorer
depicting relationships between objects (for example, peers of a host or services for a
host):
•
Peer IP—Selected host and all peers of this host. Hosts are grouped in networks /8,
/16, /24. Every network appears as a graph node and is connected to its subnetworks
and hosts.
•
Outbound Services—A host or network and its outbound services. The services are
grouped by protocol (TCP, ICMP, and so on) and by service port range. Every group is
displayed as a separate node, for example, for a host 10.150.151.3 with outbound service
FTP, the graph structure is: [Host:
10.150.151.3
]- [Protocol:TCP]- [Service
range:TCP/0-1024]-[Service:TCP/21]
•
Inbound Services—A host or network and its inbound services. The services are grouped
by protocol (TCP, ICMP, and so on.) and by service port range. Every group is displayed
as a separate node, for example, for a host 10.150.151.3 with outbound service FTP, the
graph structure is: [Host:
10.150.151.3
]- [Protocol:TCP]- [Service
range:TCP/0-1024]-[Service:TCP/21]
•
Server Profiles—One host or network and the context for server-related traffic. Every
context is connected to its host/network related value, for example, on a host is an
SSL server running version 3.1. The graph displays the host and its relationship to the
host connected 'SSL Server Version' context and to the context connected value '3.1'.
•
Client Profiles—One host or network and context for the client related traffic. Every
context is connected to its host/network related value, for example, on a host is an
SSL server running version 3.1. The graph displays the host and its relationship to the
host connected 'SSL Server Version' context and to the context connected value '3.1'.
•
Outbound IP—All outbound hosts/networks for a selected service, context, or value.
•
Inbound IP—All inbound hosts/networks for a selected service, context, or value.
•
Value—All values for a selected context.
Connections Detail Pane
Use the Connection Details pane to view a list of all objects connected to the currently
selected object in the graph. For example, if you are viewing an Outbound Services graph,
and a host is selected, the Connections Detail pane contains all services for this host. If
a Peer IP graph appears, the Connections Detail pane contains all peers for the selected
object.
Double-clicking on one of the objects in the
Details
pane displays the relationship graph
for it.
723
Copyright © 2010, Juniper Networks, Inc.
Chapter 18: Analyzing Your Network
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...