Monitoring VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
Viewing the VPN Status Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
Configuring a VPN FIlter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681
Modifying a VPN FIlter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681
Deleting a VPN FIlter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Configuring a VPN Display Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Viewing Active VPN Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Viewing Device-Specific VPN Information . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Monitoring NSRP Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Viewing NSRP Summary Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Viewing VSD/RTO Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
Viewing VSD Counter Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
Viewing RTO Counter Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Monitoring IDP Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Viewing IDP Cluster Summary Information . . . . . . . . . . . . . . . . . . . . . . . . . . 686
Monitoring IDP Cluster Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
Using the Realtime Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
Monitoring the Management System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
Configuring Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Configuring Device Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Configuring the GUI Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689
Using Server Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
Viewing Server Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
Viewing Additional Server Status Details . . . . . . . . . . . . . . . . . . . . . . . . 692
Viewing Process Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 693
Using Management System Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
Using Schema Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
Viewing Device Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697
Chapter 18
Analyzing Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
About the Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
About the Profiler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
Example of Unique Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
Setting Up the Profiler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
Configuring the Profiler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702
Enabling OS Fingerprinting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
Configuring Network Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
Configuring Context Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
Configuring Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
Updating Profiler Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
Starting the Profiler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
Stopping the Profiler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
Starting Profiler Operations on ISG Devices Without IDP Rules . . . . . . . . . . 705
Customizing Profiler Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
About Profiler Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
About the Protocol Profiler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
About the Network Profiler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708
About the Violation Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
Configuring Permitted Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
Copyright © 2010, Juniper Networks, Inc.
xxx
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...