•
Reacting to Vulnerability Announcements on page 718
•
Stopping Worms and Trojans on page 719
Configuring a Network Baseline
A baseline is a static view of your network traffic patterns. This view, which is compiled
from multiple views of traffic over time, represents the normal, known activity that occurs
on your network. By setting a baseline for your network, you can quickly detect any traffic
that deviates from or violates that baseline and take appropriate measures.
Identifying a Baseline
Your devices begin learning your network baseline as soon as the Profiler starts. As your
devices profile the network for the first time, each component appears as new. To avoid
unnecessary log records generated by Profiler alerts, you should ensure that alerts are
not enabled in the
Alerts
tab of the
Profiler Settings
dialog box.
During the learning phase, your devices profile the network hosts, servers, and software
applications that they protect; the Profiler synchronizes profile information from the
devices and creates an initial view of your network. Each time you synchronize the devices,
the Profiler incorporates any new data into this view, creating a more complete, up-to-date
image of your network. You should continue to synchronize data daily until you feel the
Profiler is accurately depicting your normal traffic patterns.
Because all networks are different, the learning phase can range from a few hours to a
few weeks.
Setting a Baseline
When you are satisfied that the Profiler has detected each host, protocol, and port that
you want to profile, you have successfully created a network baseline. By itself, this
baseline view can help you implement software and hardware upgrades, take inventory
for new support contracts, plan for a network ROI investigation, and so on.
However, the true power of your network baseline is to enable your devices to identify
network deviations. The Profiler uses the baseline to identify new or unknown hosts or
software that might represent a network vulnerability. Network deviations can be a simple
application update, or a serious security breach.
When enabled, if the device discovers a new host, protocol, or port, the device generates
a log record, such as PROFILER_NEW_HOST, in the subcategory column of the Log Viewer.
Keeping Your Network Current
Typical networks include multiple servers and hosts, each running different operating
systems and software applications that are important to users on the network. While
this variety helps users accomplish their tasks, it can make it difficult to keep your network
systems current. As new versions or security updates are announced, you must first
determine if your network is affected, locate the affected components, then patch as
appropriate.
To help you maintain control of your network software versions, the Profiler uses passive
application fingerprinting to identify the application version for each service used in your
717
Copyright © 2010, Juniper Networks, Inc.
Chapter 18: Analyzing Your Network
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...