About the Application Profiler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
Using Profiler Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712
Filtering and Sorting from the Protocol Profiler, Network Profiler, and
Violation Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712
Filtering and Sorting from the Application Profiler . . . . . . . . . . . . . . . . . 713
Refreshing Profiler Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714
Viewing Database Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714
Viewing Detailed Network Information . . . . . . . . . . . . . . . . . . . . . . . . . . 715
Purging the Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 716
Recommended Profiler Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 716
Configuring a Network Baseline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
Identifying a Baseline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
Setting a Baseline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
Keeping Your Network Current . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
Proactively Updating Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
Reacting to Vulnerability Announcements . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
Example: Identifying Vulnerable Components . . . . . . . . . . . . . . . . . . . . 718
Stopping Worms and Trojans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
Example: SQL Worm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
Example: Blaster Worm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720
Accessing Data in the Profiler Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720
About Security Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
Security Explorer Main Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 722
Graph Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723
Connections Detail Pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723
Reference Point Pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724
Log Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724
Reports Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724
Using Security Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724
Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
Analyzing Relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
Viewing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
Transitioning to Other Relational Graphs . . . . . . . . . . . . . . . . . . . . . . . . 726
Setting a Time Duration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726
Viewing Predefined Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726
Refreshing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
Adding and Removing Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
Exporting to HTML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
Chapter 19
Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729
About Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729
About Log Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730
About Log Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730
About Log Severity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
Viewing Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
Device Limitations for Viewing Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733
xxxi
Copyright © 2010, Juniper Networks, Inc.
Table of Contents
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...