2.
Take appropriate measures to secure the network, for example:
•
Investigate the source IP of the traffic and contact the user. If the traffic is legitimate,
you might need to add the service to your corporate security policy to allow it on
your network. You should also edit the permitted object to include the service so
you no longer see the service in the Violation view.
•
Create a rule in your security policy that drops connections between your internal
network objects if the traffic uses a service that you do not allow on your network.
About the Application Profiler
The Application Profiler view is a table of information that allows you to view network
traffic information at the application and application group level. By default, this view
contains only the data collected during the configured time interval. You can also specify
filters to display only the data you want to view.
As the applications that are running on the network form a hierarchy, the volume of traffic
that is generated by individual applications or application groups can be added to provide
the aggregate traffic volume information from the parent application group. As you move
up the root of the application hierarchy, you can view the total network traffic volume.
The Application Profiler view is divided into two sections: on the left panel, the hierarchical
application view displays a tree of the application categories with volume information
(in bytes and packets); on the right panel the application session view displays the
application name and the aggregated bytes and packets for the application. You can
expand the application name to see latest session data for that application.
Table 87 on page 721 lists and describes the information that you can view using the
Protocol Profiler:
Table 87: Applciation Profiler Data
Description
Column
Source IP address of the traffic profiled.
Src IP
Destination IP address of the traffic profiled.
Dst IP
VLAN ID associated with the traffic profiled.
VLAN ID
Application ID associated with the traffic profiled.
Application
Byte count for the traffic profiled.
Byte Count
Packet count for the traffic profiled
Packet Count
The user login name.
User
The role group to which the user that is associated with the traffic profiled
belongs.
Role
721
Copyright © 2010, Juniper Networks, Inc.
Chapter 18: Analyzing Your Network
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...