•
Context—Plain text describing one protocol attribute, for example, 'SSL server version'
•
Value—Value specific for a context, for example, for 'SSL server version' the value '3.1'
Graph Types
Depending on the starting reference point, the following graphs appear in Security Explorer
depicting relationships between objects (for example, peers of a host or services for a
host):
•
Peer IP—Selected host and all peers of this host. Hosts are grouped in networks /8,
/16, /24. Every network appears as a graph node and is connected to its subnetworks
and hosts.
•
Outbound Services—A host or network and its outbound services. The services are
grouped by protocol (TCP, ICMP, and so on) and by service port range. Every group is
displayed as a separate node, for example, for a host 10.150.151.3 with outbound service
FTP, the graph structure is: [Host:
10.150.151.3
]- [Protocol:TCP]- [Service
range:TCP/0-1024]-[Service:TCP/21]
•
Inbound Services—A host or network and its inbound services. The services are grouped
by protocol (TCP, ICMP, and so on.) and by service port range. Every group is displayed
as a separate node, for example, for a host 10.150.151.3 with outbound service FTP, the
graph structure is: [Host:
10.150.151.3
]- [Protocol:TCP]- [Service
range:TCP/0-1024]-[Service:TCP/21]
•
Server Profiles—One host or network and the context for server-related traffic. Every
context is connected to its host/network related value, for example, on a host is an
SSL server running version 3.1. The graph displays the host and its relationship to the
host connected 'SSL Server Version' context and to the context connected value '3.1'.
•
Client Profiles—One host or network and context for the client related traffic. Every
context is connected to its host/network related value, for example, on a host is an
SSL server running version 3.1. The graph displays the host and its relationship to the
host connected 'SSL Server Version' context and to the context connected value '3.1'.
•
Outbound IP—All outbound hosts/networks for a selected service, context, or value.
•
Inbound IP—All inbound hosts/networks for a selected service, context, or value.
•
Value—All values for a selected context.
Connections Detail Pane
Use the Connection Details pane to view a list of all objects connected to the currently
selected object in the graph. For example, if you are viewing an Outbound Services graph,
and a host is selected, the Connections Detail pane contains all services for this host. If
a Peer IP graph appears, the Connections Detail pane contains all peers for the selected
object.
Double-clicking on one of the objects in the
Details
pane displays the relationship graph
for it.
733
Copyright © 2010, Juniper Networks, Inc.
Chapter 18: Analyzing Your Network
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...