host), ports (non-IP protocols, TCP/UDP ports, RPC programs), and Layer-7 data that
uniquely identifies hosts, applications, commands, users, and filenames.
The Profiler is supported in all IDP modes and in HA configurations, and it queries and
correlates information from multiple devices.
To use the Profiler, you must first configure the networks and hosts on your internal
network that you want to monitor. The device monitors traffic at the network and
application levels. You can use this data to investigate and analyze potential problems
in the network and to resolve security incidents.
During profiling, the device records network activity at Layer-3, Layer-4, and Layer-7 and
stores this information in a searchable database called the Profiler DB. The device uses
session creation, session teardown, and protocol contexts to generate this database,
which defines all unique activities occurring on your network. Unique activities include
attempts, probes, and successful connections. The device logs normal events only once,
and it logs all unique events as often as they occur. A normal event is an event that
reoccurs frequently and does not change. A unique event is an event that is new,
unexpected, or does not match the normal traffic patterns of your network.
Example of Unique Events
For example, you allow users to use a laptop to connect to the corporate network while
working in a conference room.
•
Normal Event
. Wendy holds a meeting every Tuesday at 4:00 PM in conference room
A. Every meeting, she connects her laptop to the network and accesses documents
on the primary fileserver. Because the same event occurs multiple times, the device
logs the event once and includes a timestamp that indicates the first and last times
Wendy accessed the network from conference room A.
•
Unique Event
. The device logs changes from normal activity as a unique event in the
Profiler.
•
During one of Wendy’s Tuesday meetings, she discovers she needs a document that
resides on the Engineering server. She connects to that server and downloads the
needed files. Because this connection differs from her usual activity, the device logs
it as a unique event and records the IP and MAC addresses for both Wendy’s laptop
and the Engineering server.
•
The device also logs other unique qualifiers, such user name and e-mail address for
each individual that participated in the connection. If Wendy is out sick and another
person logs into her laptop to run the meeting, the device records the connection as
a unique event because the user name has changed.
To see all normal and unique events on your network, you configure and start the Profiler
on multiple devices. This enables the Profiler to aggregate and display a complete view
of your internal network.
NOTE:
Profiler DBs remain on individual devices even if the devices restart.
Copyright © 2010, Juniper Networks, Inc.
700
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...