•
Sorting—Click the column header to sort columns in ascending or descending order.
•
Rearranging Columns—Drag a column header to a new position in the table to rearrange
the order of the columns in the viewer.
All filter criteria are saved each time you log out of the UI.
Example: Setting a Time Interval
Profiler queries that return a very large amount of data may not complete in an acceptable
amount of time. By default, queries that take longer than 120 seconds (2 minutes) will
time out.
You can reconfigure the timeout using the Profiler settings under the
Tools
menu.
If the Profiler times out before your query is finished, refine your filter criteria. For example,
if you want to analyze a specific event in your internal network, set a time interval for the
data.
The Profiler records the first-seen and last-seen timestamps for each entry in the
database. You can set a time interval based on these timestamps. You can set an exact
From and To time, or enter the Last day, hour, minute, or seconds:
•
Use the
First Seen
setting to define a start timestamp threshold. If the device logged
an event for the first time, and the event timestamp is after the start timestamp, the
event appears in the Profiler view. For example, to see all new events in the last 2 days,
configure the First Seen timestamp as the last 2 days.
•
Use the
Last Seen
setting to define a last timestamp threshold. If the device logged
an event, and the event timestamp is before the last timestamp, the event appears in
the Profiler view. For example, to see what network components have been idle over
the last 10 days, configure the Last Seen timestamp as the last 10 days.
After you have configured a time interval, the selected Profiler view automatically applies
the time interval as a filter criterion.
Filtering and Sorting from the Application Profiler
To help you view and analyze data in the Application Profiler, you can use criteria to filter
information.
You can double-click in the Src IP and Dst IP address column fields that appear in the
Filter Criteria
to add entries that match the column you selected as a criterion to filter
the Application Profiler view. You can also right-click on any entry in the Profiler view and
select
Add to Filter
to add that entry as a filter criterion. Similarly, you can use the
Remove
From Filter
option to remove that entry as a filter criterion.
NOTE:
You cannot filter on the Application column of the Application Profiler.
Click on the
Negate
option to hide entries that match the criteria that you have set as a
filter. You can also right-click on any entry in the Profiler view and select
Toggle Filter
Negation
to hide entries that match that criterion.
713
Copyright © 2010, Juniper Networks, Inc.
Chapter 18: Analyzing Your Network
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...